Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...252 NEXT
Sort by:  Most Relevant  |  Date
5 simple steps you can take to prevent a data breach

Blog  As 2019 ends, it will wrap up as one of the worst years for cybercrime in recent memory. Reports reveal there were more than 3,800 data breaches within the first six months of the year, and some major cases leaked more than 3.2 billion customer records. These numbers are more than double 2018's enti...

Last updated: Dec 13, 2019   5:44 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions   |      Uncategorized
Drastically simplify your IoT data pipeline

Blog  The IoT data pipeline is a simple concept. First, data is gathered from multiple sensors, then all data is transformed into a common format, followed by storing it in data lake storage. Once the data is stored in an accessible place, analysts can use it to come up with answers to business problems. ...

Last updated: Dec 12, 2019   8:22 PM GMT  |  Blog: IoT Agenda   |      Data Lakes, Data storage, Internet of Things
Vilified then vindicated - victory for subpostmasters in Post Office trial shows risk of tech hubris

Blog  In 2004, Computer Weekly received a letter from Alan Bates, a former subpostmaster in Craig-y-Don, a coastal suburb of Llandudno in north Wales. Its that long ago that the letter arrived typewritten on paper in the post which was somewhat ironic in the circumstances. The letter came four yea...

Last updated: Dec 11, 2019   3:16 PM GMT  |  Blog: Computer Weekly Editor's Blog
2020 Technology Predictions of SIOS Technology @SIOSTech

Blog  In this post, let me share the 2020 Technology Predictions of SIOS Technologys Frank Jablonski, VP, Global Marketing, that span cloud, AI/ML, DevOps, HA/DR, databases and the channel. Those are as below: Frank predicts that Machine learning and artificial intelligence will deliver cost savings t...

Last updated: Dec 11, 2019   5:25 AM GMT  |  Blog: Quality Assurance and Project Management   |      Artificial intelligence, DBaaS, DevOps
CI/CD series - Confluent:Events provide an 'in-built primitive' for continuous coding

Blog  This is a guest post for the Computer Weekly Developer Network in our Continuous Integration (CI) & Continuous Delivery (CD) series. This contribution is written by Neil Avery, lead technologist and member of office of the CTO (OCTO) at Confluent -- the company is known as for its event streami...

Last updated: Dec 10, 2019   8:25 AM GMT  |  Blog: CW Developer Network
WhiteSource acquires & open sources Renovate dependency update toolset

Blog  Open source security and license compliance management company WhiteSource has brought dependency update company Renovate into its stable. All of Renovates current commercial offerings will now be available for free under its new name, WhiteSource Renovate. Founder of Renovate Rhys Arkins expla...

Last updated: Dec 9, 2019   10:27 AM GMT  |  Blog: Open Source Insider
Sumo Logic cracks on with new bands of intelligence strapping

Blog  Self-styled continuous intelligence company Sumo Logic has reached beta on two new analytics services that extend its Cloud Flex offering (a credit-based licensing strategy). Interactive Intelligence Service and Archiving Intelligence Service work to provide monitoring, troubleshooting and threat d...

Last updated: Dec 6, 2019   10:38 AM GMT  |  Blog: CW Developer Network
Get the best from connected RPA in 7 steps

Blog  Connected RPA provides a collaborative platform for humans and automated Digital Workers to deliver business-led, enterprise-wide transformation. Although connected RPA is a business-led technology, it can end up out of control if its treated solely as a pure business project. However, its not...

Last updated: Dec 5, 2019   10:00 PM GMT  |  Blog: IoT Agenda   |      Automation, Business strategy, connected RPA
Sophos to developers: who you gonna call? (for cyberthreat APIs)

Blog  Every company is now a software company, this much we already know. But now, every company wants to be a developer company, well thats the emerging message from some of industrys newer and more established players. Not content with being a next-generation cybersecurity solutions firm (...

Last updated: Dec 5, 2019   9:55 AM GMT  |  Blog: CW Developer Network
Dynatrace musters cross-cluster application fluster buster

Blog  Dynatrace is a company that specialises in the monitoring and control of enterprise-scale application performance, the underlying infrastructure layer and the experience of users. It does this at scale, running what it calls a Dynatrace cluster as a coalesced instance of software intelligence desig...

Last updated: Dec 4, 2019   8:31 AM GMT  |  Blog: CW Developer Network
Battery-free smart home adoption? Its possible

Blog  The time of the smart home is now. A staggering 1.15 billion annual shipments of Bluetooth smart home devices are expected by 2023 with connected home devices exceeding home automation by a ratio of three-to-one, according to a 2019 Bluetooth market update. Its no longer science fiction to contro...

Last updated: Dec 3, 2019   9:54 PM GMT  |  Blog: IoT Agenda   |      battery life, Bluetooth, Internet of Things
Ubuntu 19.10 offers integrated AI/ML developer experience

Blog  Autumn (or Fall, depending on your level of Americanization) was a busy period so busy in fact that the Computer Weekly Open Source Insider blog saw a number of milestone advancements go whizzing past. Among those news items were catching up on as we approach the Christmas silly season is the...

Last updated: Dec 3, 2019   8:23 AM GMT  |  Blog: Open Source Insider
Your election choice: Protectionist Stagflation or Radical (Technology enabled) Change

Blog  Without radical change, particularly to our education and training system to give our current and future workforce the skills of the future, that future is bleak, who-over wins on December 12th. Thec Conservative spending plans are ambitious. They require much more than the Brexit Dividend from hal...

Last updated: Nov 30, 2019   8:05 PM GMT  |  Blog: When IT Meets Politics   |      Brexit, Conservative, digital
Cybersecurity risks affect IIoT fog computing

Blog  Cloud computing within IIoT is creating new opportunities for manufacturers and industrial systems. From connected cars and smart cities to real-time analytics and 5G mobile, IIoT sensors are generating data in unprecedented volumes. Since most essential smart factory services would be inefficient ...

Last updated: Nov 27, 2019   4:29 PM GMT  |  Blog: IoT Agenda   |      Cyberattacks, cybersecurity, encrypted communications
Less data, slower? Not with the right integration

Blog  This is a guest blogpost by Derek Thompson, VP EMEA, Boomi, which is a Dell Technologies business unit. If theres one thing all organisations today can agree on, its that no one is asking for less data slower, and the need to satisfy rising consumer demand is a constant source of pressure. Wh...

Last updated: Nov 27, 2019   11:35 AM GMT  |  Blog: Data Matters
Consultant's free FedRAMP readiness assessment tool gets early looks

Blog  Quzara LLC, a consulting firm based in Reston, Va., has rolled out a FedRAMP readiness assessment tool, conducting 30 reviews of independent software vendors and cloud providers in its first 60 days of availability. FedRAMP, which stands for the Federal Risk Authorization Management Program, is a g...

Last updated: Nov 26, 2019   3:55 PM GMT  |  Blog: Channel Marker   |      Channel
Tandem and TrueLayer partnership shows how fintech can support fintech

Blog  One of the reasons many of the large traditional banks have such clunky IT is the fact that for years they preferred to do most of the development themselves. Proprietary legacy systems were seen as a way to differentiate. But it was actually very costly and ended up holding banks back. How things ...

Last updated: Nov 26, 2019   12:01 AM GMT  |  Blog: Fintech makes the world go around
CI/CD series - Synopsys: Where does security fit into CI/CD?

Blog  This is a guest post for the Computer Weekly Developer Network in our Continuous Integration (CI) & Continuous Delivery (CD) series. This contribution is written by Meera Rao in her capacity as a senior principal consultant at Synopsys -- the company is known for its work in silicon chip design...

Last updated: Nov 25, 2019   8:08 AM GMT  |  Blog: CW Developer Network
The secondary network: What is it and how do we manage it?

Blog  If youre in IT, youve probably never heard of the secondary network. If youre in OT, its most likely one of your biggest concerns. Secondary network devices reside physically within the OT realm. However, the devices dont exist on the primary OT network, creating the potential for da...

Last updated: Nov 22, 2019   5:27 PM GMT  |  Blog: IoT Agenda   |      IIoT, IIoT connectivity, IIoT design
The future of physical retail: Connected devices and connected shoppers

Blog  U.S. consumers are expected to spend more than $1 trillion this holiday season, according to eMarketer. Ahead of the Q4 surge, brick-and-mortar retailers are experimenting with IoT technology, from smart mirrors and tablets in fitting rooms to VR headsets and beacons on the retail floor, to transfor...

Last updated: Nov 21, 2019   4:00 PM GMT  |  Blog: IoT Agenda   |      commercial IoT, connected devices, Internet of Things
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: