Search Results | Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...1630 NEXT
Sort by:  Most Relevant  |  Date
WMOC#11 - Zermatt!

Blog  Steve Maine - Zermatt: Claims-based identity for ASP.NET (and more!) Vittorio Bertocci - Announcing the Beta release of Zermatt Developer Identity Framework Dominick Baier - CLR Security Site on Codeplex, Skiing in "Zermatt" Dare Obasanjo -Network Attached Memory: Terracota as an Alternativ...

Last updated: Jul 16, 2008   9:15 PM GMT  |  Blog: Service Endpoint   |      Architecture, c#, Design
WSDAC#28 - IronPython 2.0 Released

Blog  Stefan Tilkov - Everything Becomes LispAWS Editor - Amazon SQS Resources High scalability blog -Scaling MySQL on a 256-way T5440 server using Solaris ZFS and Java 1.7 Harry Pierson -IPy RTW FTW! Todd Hoff - Strategy: Facebook Tweaks to Handle 6 Time as Many Memcached Requests Werner Schuster - P...

Last updated: Dec 17, 2008   4:28 AM GMT  |  Blog: Service Endpoint   |      agile, Architecture, azure
Cloud Computing, SAP, PeopleSoft, Html and Security are skills in Demand

Blog  Dice this week released its January 2011 report, which detailed the skills most in demand in the IT industry. Basing its data on the number and types of job postings available, Dice determines what types of technical expertise are most in demand. According to the career Web site, skills requests ...

Last updated: Jul 27, 2011   9:48 PM GMT  |  Blog: IT Project Management   |      cloud computing, HTML, Security
Next pass on Data Center Automation "Blueprint"

Blog  Thanks for the feedback, I've incorporated some points that have been made into an updated version of the Data Center Automation Blueprint (DCAB). As mentioned previous this is a work in progress and I love getting feedback, ideas, concerns etc. with the model. As mentioned previously I'm trying...

Last updated: Dec 17, 2007   5:59 PM GMT  |  Blog: Adventures in Data Center Automation   |      Application monitoring, CMDB, DataCenter
Great write-up on Security Managment activities this year

Blog  I have Security as one of the 6 DCAB Functional Categories. This article does a great job highlighting some key landscape changes in the overall Security Management market (some items are beyond what is covered by this blog). As it relates to monitoring/managing the security of the data center t...

Last updated: Dec 27, 2007   6:04 PM GMT  |  Blog: Adventures in Data Center Automation   |      EMC, HP Software, IBM Tivoli
Building out a reference model for data center monitoring/automation

Blog  So as this blog is just getting rolling I'm quickly realizing I need to come up with a graphical reference model, key approaches and metrics to reference. So to get that process started, i'm going to brainstorm some items here and hope to get some feedback on areas I should make sure I don't forget...

Last updated: Nov 6, 2007   5:17 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter, Network monitoring, Performance management
Automating security, risk & compliance for your data center

Blog  Time for a quick side bar from our reference model discussion. Just wanted to make a quick, timely mention for a space that's is evolving currently called IT Governance, Risk & Compliance Management or "IT GRC" (as defined by Gartner, Forrester, EMA, IDC). This is an emerging space that help...

Last updated: Nov 12, 2007   5:25 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter, Security, Securitychannel
Webcast: 'The Inside Story on Compliance: Confessions of a QSA'

Blog  This blog post contains my tweets from the webcasts premiere episode in December. The Inside Story on Compliance: Confessions of a QSA is now available for download onBitpipe.com (free registration may be required). *** Two webcasts premiering now. First up: The Inside Story on Compliance ...

Last updated: Jan 5, 2009   9:46 PM GMT  |  Blog: IT Webcasts   |      BI, biometrics, compliance
Hello world!

Blog  Welcome to IT Knowledge Exchange. This is an example of your first blog post. You'll need to delete this example blog post and the attached example comment before your blog goes live. Let me know if you have any questions. Thanks. (Brent)

Last updated: Feb 6, 2009   0:00 AM GMT  |  Blog: The Security Viewpoint   |      Security
IT: The department of no

Blog  Did you ever have the impression that users think of their IT support staff as the department of no? A frustrated user recently approached me with: You guys have this system so locked down we cant do anything. With security as the number one network concern, I can see why users would think ...

Last updated: May 29, 2009   3:49 PM GMT  |  Blog: Business Intelligence Technology   |      IT department, IT support, Security
The future of trustworthy computing

Blog  The departure of security guru Steve Riley from Microsofts Trustworthy Computing Group last week raises questions on the direction of Microsoft in the security arena. The move was termed a restructuring. Under the current economic conditions, many companies are now using this line to justify cutt...

Last updated: May 14, 2009   7:48 PM GMT  |  Blog: Business Intelligence Technology   |      Microsoft, Security, software
HP bought 3Com

Blog  Why? Couple reasons: Ethernet switching, routing solutions, and networking security capabilities to augment HP's ProCurve networking line. In other words, HP plans to begin taking share in Cisco's long-unchallenged domain. Additionally, this move strengthens HPs position in China, which i...

Last updated: Nov 12, 2009   7:44 PM GMT  |  Blog: You're using your OS for what?   |      3Com, Cisco, HP
New Advisories From Ciscos PSIRT

Blog  Yesterday saw Ciscos Product Security Incident Response Team (PSIRT) release details of 6 new security vulnerabilites, five of which affect IOS based platforms and the sixth one affecting their Unified Communications Manager, details of all of the vulnerabilities can be seen by following the links i...

Last updated: Sep 23, 2010   12:36 AM GMT  |  Blog: Packet Blog   |      Cisco, IOS, PSIRT
Wireless Security.

Blog  One member of the the Q and A website posted a question recently: Wireless Security on a Belkin Router This got me thinking about how many times I have seen huge lists of open access points from my mobile devices. It would appear that even with simplified web based GUI interfaces that a lot of hom...

Last updated: Aug 12, 2010   4:21 PM GMT  |  Blog: Packet Blog   |      Networking, Security, Wireless
Trial Software Survey: You could win a $50 Amazon gift card!

Answer  Hey there, we'd love to get your feedback in this survey on trial software downloads. It's an area we're looking at expanding, perhaps even into its own section, and any insights you could provide would be much appreciated. You could even win a $50 Amazon.com gift card for participating: http://www...

Last updated: Sep 8, 2009   8:19 PM GMT   |    DataCenter, Lotus Domino, Microsoft Exchange
The most-watched IT questions this week: Sept. 15, 2009

Answer  As part of a new feature on the IT Knowledge Exchange Community Blog, we're highlighting the top 10 most-watched questions. Here are the top 5: Virtualization vs. ConsolidationTracing a computer to an IP addressConnect remote Oracle 11g server in VB 6.0How to utlize multiple static IP's when ISP li...

Last updated: Sep 15, 2009   3:26 PM GMT   |    AS/400, Channel, CIO
Under-the-radar enterprise security threats

Answer  Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

Last updated: Oct 9, 2009   3:59 PM GMT   |    Enterprise Security, Open IT Forum, Security
Most popular blog posts this week

Answer  10. Removing old hardware after a P2V conversion Eric Siebert shares a long-held best practice regarding old server management. 9. The challenge of managing risk when IT budgets tighten Linda Tucci explains the challenges of a down economy -- and offers some tips on coming out ahead. 8. Ellison co...

Last updated: Oct 16, 2009   2:53 PM GMT   |    AS/400, Channel, CIO
The most-watched IT questions this week: Nov. 3, 2009

Answer  Here are the 10 most watched questions on ITKE: Theres some great discussions going on. Go answer a question now and take your shot at winning a TV: 1. Problem installing Exchange 2007 Management Tools was posed by Labnuke99 and answered by Mshen. 2. What Event ID was asked by Newbiepeon and an...

Last updated: Nov 4, 2009   2:33 PM GMT   |    AS/400, Channel, CIO
The most-watched IT questions this week: Dec. 8, 2009

Answer  Here are the 10 most watched questions on ITKE: Theres some great discussion going on. Go answer a question now! 1. Pushan1234 asks about Returning string value from a stored procedure in sql server 2005 to vc# ide code at runtime. CarlosDL and MrDenny provide some pointers. 2. Bonbon78 runs in...

Last updated: Dec 8, 2009   8:07 PM GMT   |    AS/400, Channel, CIO
The IT Blog Top 10: Feb. 4, 2010

Answer  Here are the most popular blog posts on the ITKnowledgeExchange network this week. Read the rest of the top 10 on the Community Blog, or apply for your own blog by e-mailing me at Michael@ITKnowledgeExchange.com. 1. How to allow the root user to log in to VMware ESX Server with SSH David Davis h...

Last updated: Feb 4, 2010   4:49 PM GMT   |    AS/400, Channel, CIO
Outsource SOC ... who is good?

Answer  Which companies should i contact to solicit info about their willingness to provide outsourced SOC services to a large company?

Last updated: May 21, 2010   6:57 PM GMT   |    Security, Security management, SOC
508 security testing

Answer  how to do 508 testing in a security environment

Last updated: Jun 7, 2010   5:41 PM GMT   |    Auditing software (security), Security, Security testing
Which academic program would help me out more with Networking?

Answer  I am interested in completing certification as a CCNA after/while finishing up a two year degree to help my prospects. Both degrees are offered at local technical colleges (not commercial) that are certified by Cisco as a training partner in their program. I have looked through both course offerin...

Last updated: Jul 30, 2009   10:50 PM GMT   |    CCNA, CCNE, College
Five t-shirts to give away: Upload those profile pictures!

Answer  I've been noticing a dropoff in profile pictures lately -- here's a reminder on how to upload yours if you haven't already. If you're participating in the community, we want to know who you are! I'll be mailing out five t-shirts to the first five people (with eligible mailing addresses) to upload p...

Last updated: Oct 19, 2009   7:43 PM GMT   |    AS/400, CIO, CRM
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...1630 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: