Search Results | Application security
PREV 1...10   20   30...39   40   41   42   43   44   45   46   47   48...   50   60   70...250 NEXT
Sort by:  Most Relevant  |  Date
Digital Rights Management Must Try Harder

Blog  So Bill Gates has also discovered that Digital Rights Management is not where it should be according to reports from a group of influential bloggers he invited to Redmond. We don't have the right thing here in terms of simplicity or interoperability he is quoted as saying. And what shoul...

Last updated: Dec 15, 2006   3:46 PM GMT  |  Blog: David Laceys IT Security Blog   |      identity, People
Why are smart devices still so stupid?

Blog  Software application developers working with the kinds of embedded computing devices that we now class as citizens within the so-called Internet of Things (IoT) can be forgiven for getting somewhat confused. The Internet of Things a.k.a The trouble is, the Internet of Things is also known as: ...

Last updated: Jan 19, 2016   8:06 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
LA proving a tarpit for Google, CSC

Blog  Remember last year when Google trumpeted its big-boy computing win over Microsoft in a major Los Angeles email-and-applications deal? Remember how the cloud-inflected Google Apps Premiersystem, deployed by Computer Sciences Corp., was gonna be awesome? Well, it's a year-and-a-half laterand we...

Last updated: Apr 21, 2011   2:59 AM GMT  |  Blog: Channel Marker
Heartbleed bug, building a risk management plan and cleaning up data

Blog  The big news this week? A defect in one of the Internet's key security methods, OpenSSL, that's forcing two-thirds of all websites to consider changes to protect the security of consumers. Learn more about what this OpenSSL heartbeat bug -- appropriately named "Heartbleed" -- means for CIOs in tod...

Last updated: Apr 11, 2014   5:45 PM GMT  |  Blog: CIO Symmetry
Box Adds HIPAA, HITECH Support to Expand Into Healthcare

Blog  You know how every time you go to a new doctor, you have to sign this form (does anybody read it?) that talks about your rights to privacy for your medical records? Vendors of medical services have their own requirements to live up to, and Box has announced that it is complying with those regulation...

Last updated: Apr 26, 2013   4:05 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
DattoCon 2018 attendees get a glimpse of the future

Blog  If you attended the recent DattoCon 2018 event, it's dollars to donuts you heard about near-term opportunities in the small and medium business (SMB) market. Managed service providers (MSPs), however, also got a peek of what might transpire a bit further down the road. Ian McChord, vice president o...

Last updated: Jun 28, 2018   12:41 AM GMT  |  Blog: Channel Marker
IT outsourcing predictions for Europe in 2013. Part Three T-Systems

Blog   Here is another round of predictions about the European IT outsourcing market next year. Yesterday I featured outsourcing lawyer Mark Lewis of Berwin Leighton Paisner and the previous day it was the predictions of KPMG's Lee Ayling.Today it is the turn of T-System's UK head Sam Kingston to give som...

Last updated: Dec 19, 2012   7:03 AM GMT  |  Blog: Investigating Outsourcing   |      Uncategorized
Storage Decisions 2010: Storage Insecurities Ride On

Blog  As TechTarget's Storage Decisions conference wrapped up today, I was perusing the conference site and noticed something peculiar about the sessions. There are sessions on backup. There are sessions on disaster recovery. There's even one on ITIL. But nowhere could I find anything on storage security....

Last updated: Jun 15, 2010   11:01 AM GMT  |  Blog: Enterprise IT Watch Blog
Application Firewalls

Blog  I was re-reading the VISA CISP data security standards documentation and reminding myself firstly, of what an enjoyable read this is, and secondly of some of the recent new clauses put in to entertain us. Clause 6.6 (on page 8 of the document) states that application layer firewalls are "considered...

Last updated: Nov 22, 2006   3:45 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Compliance, Technology
It's up to IT to make end-user computing easy

Blog  It's part of IT's job to deal with end users who aren't tech-savvy. The latest research says itmay be a bigger part of the job than most people realize. About two-thirds of peopleaged 16 to 65 have poor or worse computing skills, according to a study by the Organization for Economic Cooperation...

Last updated: Dec 6, 2016   2:58 PM GMT  |  Blog: Modern Mobility   |      Citrix, End-user, Microsoft Windows
Mendix: smart IoT apps for smart dummies

Blog  Not just software application development apps, not just Rapid Application Development (RAD) apps but rapid delivery of so-called smart apps. This is the set piece being played out by Mendix. IoT, big data and machine learning The firm offers an open platform ecosystem of tools in Mendix 7 ...

Last updated: Jun 8, 2016   9:01 AM GMT  |  Blog: Open Source Insider
SFDC - AppExchange Certification Process

Blog  I was chatting to a techie from a couple of evenings ago and questioning him about the processes in place for ensuring the security of applications posted on their AppExchange. It's a pretty comprehensive process and one that might be useful to adapt for your own development work. The...

Last updated: Oct 25, 2007   6:15 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      AppExchange, SFDC
Cisco ASA FirePOWER Services Licensing

Blog  In order to have the full Next Generation Features enabled on the Cisco ASA FirePOWER Module one should ensure that they have appropriate licenses. Currently Cisco is offering follow licenses for Cisco ASA FirePOWER Services License Types License Type Service Subscription need to be purc...

Last updated: Aug 29, 2016   3:53 PM GMT  |  Blog: Network technologies and trends   |      ASA, Cisco, detection
BYOD security: Paranoia or necessity?

Blog  Not too long ago, IT departments faced the challenge of integrating a new consumer device into the corporate infrastructure; this was the iPad which took the fancy of every CXO and techno-affiliate with its cool factor. It did not matter that the tablet was another appendage to do everything that th...

Last updated: Apr 26, 2011   10:08 AM GMT  |  Blog: Oh I See! Getting CIOs to view their jobs from a different angle
Investing in IoT applications: All you need to know

Blog  The technology world has witnessed the penetration of IoT in recent years, and it has been a game changer in many industries. Backed by capabilities like mobility, IoT has set new benchmarks in business performance, innovation and user acceptance. Forward-thinking companies are integrating IoT-backe...

Last updated: May 23, 2019   2:26 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT applications
CA CTO: the bottom layer is commoditised

Blog  CA World closes up in Las Vegas today with the firm having announced more acquisitions and product launches then perhaps even its top brass had expected and anticipated. In breakout sessions with CA senior VP of corporate strategy Lonne Jaffe, it appears that the company is quite open about its fin...

Last updated: Apr 24, 2013   3:01 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Cisco Live: July 1 Panel on the Seamless Cloud

Blog   This post is brought to us by Greg Ness. I'll be speaking on a panel at Cisco Live on July 1. I'm looking forward to talking about the new demands on network infrastructure and whether or not the enterprise is ready for seamless cloud. Frankly, so much of the discussion about cloud is the SMEs (or ...

Last updated: Jun 23, 2010   8:06 PM GMT  |  Blog: Infrastructure 2.0 Blog   |      Cloud Computing, Core Network Services, Data Center
Enterprises embrace mobile with hybrid development, HTML5

Blog  Employees are bringing more and more mobile devices to the enterprise, requiring companies to determine how they can best satisfy employees business needs while encountering varying operating systems. Marcio Cyrillo, head of mobile strategy at Ci&T, explains that companies view the influx ...

Last updated: Jun 26, 2012   2:55 PM GMT  |  Blog: Software Quality Insights
IoT and Hybrid Cloud in 2019 According to Don Boxley @DH2i

Blog  A recent interaction with DH2i CEO and Co-Founder, Don Boxley about the key technology transformations in 2019, he talks about two key developments he foresees in 2019 regarding IoT and Hybrid Cloud. So, his 2019 predictions go as follows. The first prediction says Enterprises will replace VPNs with...

Last updated: Dec 9, 2018   6:21 PM GMT  |  Blog: Quality Assurance and Project Management   |      DH2i, Hybrid cloud, IIoT
How can humans navigate 2.5 billion gigabytes of machine data a day?

Blog  IBM's software intelligence promotion du jour is focused on transforming how organisations engage with "business content" and make it more usable. Business content? Could a more generic and meaningless term be possible? No no wait a moment -- this terminology often refers to big data machine-g...

Last updated: Jun 25, 2014   6:28 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
PREV 1...10   20   30...39   40   41   42   43   44   45   46   47   48...   50   60   70...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: