Discussions

  • Spotify to update privacy policy after user protest

    Some Spotify users are unhappy about new privacy policies that allow access to users’ photos, video, mobile device location, voice controls and contacts

    WAshford3,755 pointsBadges:
  • Application modernisation remains a top CIO priority

    Targeting legacy is a key focus for IT departments as they shift more applications onto the cloud

    CSaran1,030 pointsBadges:
  • time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.

    Margaret Rouse8,085 pointsBadges:
  • Using flywheel power for data center uninterruptible power supply backup

    Using flywheels for data center uninterruptible power supply backup can offer benefits over traditional power storage, including less restrictive cooling and ventilation requirements, a longer lifespan, less maintenance, and more.

    ITKE366,125 pointsBadges:
  • extranet

    An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.

    ITKE366,125 pointsBadges:
  • tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and potentially the newsfeeds of their friends.

    Margaret Rouse8,085 pointsBadges:
  • Cybersecurity skills shortage? Hackers wanted

    The problem-solving skills that many enterprises need to counter threats are hard to identity, let alone multiply.

    ITKE366,125 pointsBadges:
  • Keep your software healthy during agile development

    Developers have adopted agile methods to keep up with the pace of the market, but how can they ensure code stays in good shape?

    ComputerWeekly2,785 pointsBadges:
  • Database security: Who should have access?

    The only users who should be allowed full access to any data store should be your system administrators. What about everybody else?

    searchsecurity23,005 pointsBadges:
  • Have you ever been asked to boot up your laptop at airport security?

    searchsecurity23,005 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following