• NIST wants help building the one ID proofing system to rule them all

    The U.S. government wants to solve the weaknesses in online ID proofing systems, but it needs the help of enterprise and security professionals in order to overcome privacy concerns and other issues.

    mheller540 pointsBadges:
  • What is your organization’s top HIPAA compliance concern?

    Margaret Rouse5,315 pointsBadges:
  • How do you think machine learning services will affect the enterprise?

    ITKE355,660 pointsBadges:
  • Mobile development looks inwards as internal facing apps gain traction

    As enterprise moves forward to provide employees with the apps they need for maximum productivity, everything is on the table for reinvention. A mix of standardized and customized solutions will be required by big business to meet the needs of an internal workforce that is ready to truly mobilize.

    ITKE355,660 pointsBadges:
  • Where are the REST alternatives for real-time applications?

    Enterprise developers face number of challenges in creating frameworks for building scalable real-time applications that power modern apps like the cars moving in Uber. Read on to find out how new protocols and automatically synchronized database frameworks can help to simplify these kinds of...

    ITKE355,660 pointsBadges:
  • Docker and containerization: The uncontainable trend of 2015

    Containerization, especially using new and exciting platforms like Docker, is a massive trend in the industry. Find out how to leverage this trend to run applications, host operating systems and gain even more benefits from running in a fully virtualized environment.

    ITKE355,660 pointsBadges:
  • Long-duration advanced persistent threat attacks now the norm, say experts

    Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect.

    mheller540 pointsBadges:
  • #CIOChat: Machine learning services and the enterprise

    Predictive analytics technology is entering the public realm. But what happens when machine learning is accessible to everyone? Join #CIOChat on April 29 at 3 p.m. EST to discuss machine learning services and their effect on the enterprise.

    ITKE355,660 pointsBadges:
  • How to invoke a JSF managed bean asynchronously through JavaScript

    Sometimes great frameworks like JSF, Wicket or Spring MVC make simple tasks surprisingly difficult to do. With JavaServer Faces, the simple task of invoking a method on a managed bean is actually a bit of a chore. In this tutorial, we tackle that chore together.

    ITKE355,660 pointsBadges:
  • Failing to integrate security with DevOps? Do so at your own peril

    Security is often considered as an afterthought in the software development lifecycle. But organizations need to keep up with vulnerabilities as they move to more agile DevOps practices. Read on for some best practices in building a security conscious culture.

    ITKE355,660 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.