Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Ripple invests in Swedish open source start-up Towo Labs

Blog  Towo Labs, a Swedish startup aimed at simplifying crypto self-custody, has announced an investment from Xpring, Ripples developer initiative. Xpringis described as an initiative byRipplethat will invest in, incubate, acquire and provide grants to companies and projects run by entrepr...

Last updated: Oct 16, 2019   4:24 PM GMT  |  Blog: Open Source Insider
SELIS: A recipe for a shared logistics information space

Blog  This is a guest post for the Computer Weekly Developer Network written by Dr. Takis Katsoulakos in his role as managing director for Inlecom Systems. Inlecom Systems is an information learning and communication solutions company with offices and consultants in Brussels, UK, Athens, Ireland Spain an...

Last updated: Oct 16, 2019   1:30 PM GMT  |  Blog: CW Developer Network
UiPath Forward III: keynote notes, quotes & anecdotes

Blog  Software automation specialist organisation UiPath staged it's annual FORWARD user conference this week in Las Vegas and the Computer Weekly Developer Network team was there to soak up the tech know-how. The company's core technology proposition revolves around its development of Robotic Process Au...

Last updated: Oct 15, 2019   4:54 PM GMT  |  Blog: CW Developer Network
The future of work and enterprise IoT

Blog  IoT is exploding. According to Gartner, there will be 20.4 billion IoT devices by 2020. No longer just a pipe dream, IoT is shaping up to be the backbone of our technological future. Not only will it drive some really cool improvements in the way we live and work, but it will also generate between $...

Last updated: Oct 15, 2019   4:09 PM GMT  |  Blog: IoT Agenda   |      connected devices, Consumer IoT, Enterprise IoT
MSPWorld 2019: Five things I learned at the conference

Blog  Here are several observations from MSPAlliance's MSPWorld 2019 conference, which wraps up today in Las Vegas. 1. The industry wants to reframe the MSPs-as-target discussion MSPAlliance leadership is aiming to turn the negative publicity surrounding managed service provider security incidents into an...

Last updated: Oct 11, 2019   6:35 PM GMT  |  Blog: Channel Marker   |      IT Managed Service, IT services, MSP
No Windows 10 Sandbox Activation

Blog  I've been fooling around with the built-in Windows 10 Sandbox lately. It is indeed a useful tool for trying out unknown or potentially risky software, trial configurations, and so forth. Just for grins, however, I tried to activate the Windows 10 Enterprise license in my Sandbox. And that's how I le...

Last updated: Oct 11, 2019   4:34 PM GMT  |  Blog: Windows Enterprise Desktop   |      built-in security, Sandboxing, Windows 10
IT leaders must recognise and acknowledge the growing mental health issues from working in tech

Blog  As Computer Weekly readers will know, there are many great reasons for working in tech its fast-moving and creative, its changing the way we live and work, and mostly its well remunerated. Feel free to add your own. But IT can also be a highly pressured environment running critical...

Last updated: Oct 11, 2019   9:59 AM GMT  |  Blog: Computer Weekly Editor's Blog
Securing your supply chain is as important as securing your devices

Blog  The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the fact...

Last updated: Oct 9, 2019   6:35 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, iot
Emerging IoT attack surfaces present attackers with tempting new targets

Blog  This is the first in a two-part series. The meteoric rise of IoT has created a popular new attack surface for cybercriminals. The "2019 Sonic Wall Cyber Threat Report" indicated that there were 32.7 million cyberattacks targeting IoT devices in 2018, representing a 217.5% increase over attacks 201...

Last updated: Oct 8, 2019   7:40 PM GMT  |  Blog: IoT Agenda   |      Cyber, Cyber security, Cyberattacks
The future of IoT is here Are you ready?

Blog  IoT presents opportunities for growth and new possibilities for any organization across all industries. With IoT technology, workers can monitor a patient's health from another city or capture information on soil temperature from a field three hectares away. Substantial changes will be possible in ...

Last updated: Oct 4, 2019   8:17 PM GMT  |  Blog: IoT Agenda   |      Digital transformation, Internet of Things, iot
Who has control of your control systems?

Blog  Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum, cy...

Last updated: Oct 4, 2019   5:10 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, Internet of Things, iot
Remote connectivity for edge computing in IoT

Blog  By 2025, 41.6 billion IoT devices are expected to generate 79.4 zettabytes of data and the collective sum of the world's data will be 175 ZB, according to IDC. Essentially, close to 50% of world data will be generated by IoT. By 2025, 70% of data generated by IoT applications will be processed outsi...

Last updated: Oct 3, 2019   7:03 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT data
What developers need to know about an Alexa vulnerability

Blog  A security vulnerability was discovered in July 2019 that showed Amazons cloud servers contained voice recordings of Alexa interactions from customers. Furthermore, improper handling of records retained by Amazon, along with this Alexa vulnerability, could expose users' private data to a potentia...

Last updated: Oct 3, 2019   5:19 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
How to Improve and Lower the Cost of Distributed Enterprise Edge Data Management and Security

Blog  The distributed enterprise model continues to grow exponentially driven by both strategic plannings, as well as by default. That is, more and more organizations consist of a centralized headquarters datacenter with in-house IT expertise, together with remote sites, smaller footprint sites where user...

Last updated: Oct 3, 2019   6:02 AM GMT  |  Blog: Quality Assurance and Project Management   |      Distributed applications, Distributed computing, Distributed storage
From university lab to mainstream Mambu provides cloud ERP system for banks: Fintech interview 28

Blog  A project at a US university looking at microfinancing proved to be the spark for software as a service banking platform supplier Mambu. The company, which was launched in 2010, today describes itself as a cloud based ERP system for banks, which can complete all the customer facing accounting. ...

Last updated: Oct 2, 2019   9:28 AM GMT  |  Blog: Fintech makes the world go around
RPA series: Micro Focus - the 'smart' path from EAI to RPA

Blog  This is a guest post for the Computer Weekly Developer Network written byTravis Greene in his capacity as director of ITOM atMicro Focus and this story forms part of a series of posts on CWDN that dig into the fast-growing topic of Robotic Process Automation (RPA). TechTarget defines Rob...

Last updated: Oct 2, 2019   5:56 AM GMT  |  Blog: CW Developer Network
Percona details state of open source data management

Blog  Open source database management and monitoring services company Percona has laid down its state of open source data management software survey for 2019. Surveys are surveys and are generally custom-constructed to be self-serving in one sense or another and so convey a message set in their findin...

Last updated: Oct 1, 2019   4:05 PM GMT  |  Blog: Open Source Insider
5 Reasons Why You Should Consider SaaS for Your Business

Blog   Nowadays, it is required to have 24/7, secure access to business applications from wherever you are; and thats why more and more businessesare turning to the cloud. Its no wonder that traditional companies that run on-premise systems are struggling to stay on the market. In order to sur...

Last updated: Sep 28, 2019   1:12 AM GMT  |  Blog: SAS 70
Driving IoT innovation

Blog  Whether referenced as the fourth Industrial Revolution or the connected society, the billions of connections forming IoT will change the game for industries, enterprises and consumers. However, revolution is always triggered by the rise and demand of certain driving factors. Similarly, IoT and its d...

Last updated: Sep 26, 2019   11:31 PM GMT  |  Blog: IoT Agenda   |      5G, 5G and IoT, cellular IoT
How to prepare for the age of edge storage

Blog  The extreme storage demands of data-intensive applications are fueling tremendous growth in edge networks, and its opening a Pandoras box of potential problems. While its a given that networks and applications such as IoT, connected vehicles, augmented reality, gaming and 5G networks are st...

Last updated: Sep 25, 2019   9:34 PM GMT  |  Blog: IoT Agenda   |      Cloud data storage, Internet of Things, iot
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: