Search Results | Application security
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Think Beyond x86 Clustering For an Enterprise-Class Linux Solution

Blog  Linux has made impressive inroads into enterprise-class computing environments because of its performance, security, scalability and global open source support network. As a result, more and more enterprise-class workloadssuch as analytics, databases and transaction processingare moving to Lin...

Last updated: Sep 28, 2017   4:10 PM GMT  |  Blog: Innovation Through Infrastructure   |      Linux
The top 10 compliance risk management questions you should be asking

Blog  When it comes to IT governance, it's one thing to have staff completing compliance risk management processes; it's quite another to be confident that everything is indeed in line and secure. Understanding your level of compliance and how it relates to business risk is more than simply asking IT staf...

Last updated: Dec 6, 2011   7:27 PM GMT  |  Blog: IT Compliance Advisor
Riverbed gets Mazu Networks for a bargain

Blog  WAN optimization heavyweight Riverbed Technology gobbled up Mazu Networks this week for just $25 million in cash. Mazu is a privately held company that sells network behavior analysis (NBA) tools that analyze the interaction between users, applications and systems. Mazu Profiler, the company's flags...

Last updated: Jan 22, 2009   7:44 PM GMT  |  Blog: The Network Hub
Ensuring effective EHR use, and other health IT news this week

Blog  As the deadline for achieving meaningful use nears, some electronic health record (EHR) vendors are beginning to guarantee that their products will help providers meet meaningful use criteria. Sounds good, right? Unfortunately, it means nothing. Meaningful use criteria havent been finalized -- an...

Last updated: Apr 13, 2010   6:28 PM GMT  |  Blog: Health IT Pulse   |      CCHIT, EHR implementation, HIMSS Analytics
Raising awareness: Cisco takes aim at shadow IT

Blog  Most people have encountered the cloud at work, whether it's downloading files from an external business contact's Dropbox or hearing through the grapevine that your department is now "moving"to a cloud service. Security controls in many of these initiatives is handled (you hope) by someone at the...

Last updated: Jan 15, 2016   9:46 PM GMT  |  Blog: Security Bytes   |      Cloud Security, Cloud Services, Shadow IT
Security Flaws - Top 3 Code Vulnerabilities Causing Security Gaps

Blog  Increasing presence on internet demands higher level of security. Same way, enterprises are moving to cloud for residing their valuable data and applications. All this attracts potential risks, especially in terms of virus, ransomware, and malware. In fact, hackers only need a small wsecurity flaw t...

Last updated: Sep 30, 2017   6:38 AM GMT  |  Blog: Quality Assurance and Project Management   |      Application security, code security
Five ways to prevent data leakage

Blog  Data leakage? What's that, you ask? Well, it's a growing security issue which has at its root, the explosive proliferation of mobile and portable devices and the exponential growth of social networking tools, instant messaging, and external storage devices. Simply defined, data leakage is "the inten...

Last updated: Sep 18, 2011   11:45 PM GMT  |  Blog: Security Corner
What is Hybrid Cloud?

Blog  Before getting into any technology discussions/definition about Hybrid Cloud, it's important to understand what value it potentially provides to businesses. In the most basic definition, "hybrid" means multiple things brought together to work as a unified system. For most businesses, this means that...

Last updated: Feb 25, 2014   0:36 AM GMT  |  Blog: From Silos to Services: Cloud Computing for the Enterprise
RPA series: Micro Focus - the 'smart' path from EAI to RPA

Blog  This is a guest post for the Computer Weekly Developer Network written byTravis Greene in his capacity as director of ITOM atMicro Focus and this story forms part of a series of posts on CWDN that dig into the fast-growing topic of Robotic Process Automation (RPA). TechTarget defines Rob...

Last updated: Oct 2, 2019   5:56 AM GMT  |  Blog: CW Developer Network
Transport Layer Security (TLS)

Blog  Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. Continued Quote of the Day "TLS and SSL have defined secure communications on the internet for decades. They enable everything from secure browsing to e-commerce to sec...

Last updated: Jan 17, 2018   3:07 AM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Red Hat nibbled FeedHenry, now dines out on new mobile app platform... Samsung also eats

Blog  First the Earth cooled, then the dinosaurs died out and after that Red Hat got hungry. The company clearly identified the need for more mobile platform intelligence within its IT stack and so back in Sept 2014 the firm acquired FeedHenry. FeedHenry provides a cloud-based enterprise mobile applicat...

Last updated: Jun 24, 2015   7:55 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Overheard: Real ID -- Don't trust anyone under 50

Blog   The Associated Press explains why the U.S. Department of Homeland Security is subtly dissing people over 50: "The over-50 exemption for Real ID was created to give states more time to get everyone new licenses, and [now comes the ugly part] officials say the risk of someone in that age group bei...

Last updated: Jan 16, 2008   1:16 AM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Shortcomings of DevOps causes security bug detection to suffer

Blog  Eariler this year we spoke with Jim Manco of Manicode security. It was immediately prior to Oracle OpenWorld 2017, in which Manico was delivering a JavaOne session on Java SE 9 security. There are plenty of new tools and technologies in the latest version of the JDK to help minimize the number of J...

Last updated: Nov 13, 2017   2:27 AM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
How will 4G affect IT outsourcing?

Blog   The recently launch of 4G service from mobile company EE  has got consumers excited, especially some of my colleagues at Computer Weekly. But businesses will also be looking  to their IT departments and suppliers to see how 4G can help them. Sam Kingston, UK head at IT services firm T-Sys...

Last updated: Nov 22, 2012   9:38 AM GMT  |  Blog: Investigating Outsourcing   |      Uncategorized
Oracle nudges enterprises towards using Docker

Blog  Oracle has pushed itself further into the Docker community by allowing developers to now pull images of their flagship databases and developer tools through the Docker Store. Effective immediately, developers can pull images of Oracle products including Oracle Database, Oracle MySQL, Oracle Java 8 ...

Last updated: Apr 19, 2017   4:10 PM GMT  |  Blog: Microservices Matters   |      Application containerization, containers, Docker
Windows 7: 12 Months On

Blog   The 22nd of October 2009 represented one of the most eagerly anticipated dates in the history of desktop computing. The launch of Windows 7 promised easier, faster and more secure computing for all. And, boy oh boy, did Windows 7 deliver. Over the past 12 months, we've worked with more than 200...

Last updated: Oct 25, 2010   10:21 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
Blogs to visit when attackers target Microsoft Windows

Blog  It's been one of those weeks for Windows administrators. Tuesday, Microsoft released its October 2007 security update to address four critical flaws in Windows, Internet Explorer, Word and Outlook and a couple lesser vulnerabilities. Then, a day later, Microsoft finally acknowledged its users are ...

Last updated: Oct 11, 2007   2:45 PM GMT  |  Blog: Security Bytes
MongoDB 3.6 runs at the 'speed of data'

Blog  MongoDB 3.6 will be generally available in early December. The open source (at its core) general purpose database has some noteable changes (its makers would call them enhancements) including a so-called 'change streams' feature, which enable developers to build what are being described as more 're...

Last updated: Nov 12, 2017   10:07 AM GMT  |  Blog: Open Source Insider
First GROAN of the New Year

Blog  I was doing an audit today (I know, the term "audit" should only be used in connection with a financial exam, but everybody but Public Accountants use it this way) and examining the users inside a SQL database that holds one heck of a lot. I wish more IT Auditors would start looking inside databases...

Last updated: Jan 8, 2009   6:10 PM GMT  |  Blog: Sister CISA CISSP
COM+ printing across untrusted domains

Answer  I have a COM+ application that needs tosend a documentto a printer on a different domain (that is not set up as trusted). I have installed the printer, with the username on that domain on the Windows 2003 server, under a user on the local domain with the same username and password. I can print t...

Last updated: Aug 20, 2009   11:59 AM GMT   |    Active Directory, Active Directory interoperability, COM
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: