Search Results | Application security
PREV 1...10   20   30...43   44   45   46   47   48   49   50   51   52...   60   70   80...252 NEXT
Sort by:  Most Relevant  |  Date
Pay up for security certifications, down for all other technology certificates

Blog   Heres some good news if you're a certified security pro:Youre in the only group of certified IT professionals whose pay scale has gone up this year, Tekrati reports. A new study by Foote Partners shows that pay for 27 certified IT skills has fallen 2.1% in the past six months. The only one ...

Last updated: May 31, 2007   7:46 PM GMT  |  Blog: Channel Marker
Microsoft Security Intelligence Report Released

Blog  For the past couple of years, Microsoft has been issuing a semi-annual report on the security threat landscape. The latest version of the Security Intelligence Report (SIR), v5, was released last Monday. Microsoft appears to be taking security seriously these days: "...during the frst half of 2008 (...

Last updated: Nov 12, 2008   2:11 PM GMT  |  Blog: Security Corner
SQL Saturday 194 (#sqlsat194) Here I Come

Blog   I'm so happy to be able to announce that I'll be giving a precon at SQL Saturday 194 over in England on Friday March 8th, 2013. This precon will be will be on SQL Server Security which is a topic which I'm quite familiar with. During this full day precon we will review a variety of ways to secur...

Last updated: Dec 6, 2012   12:42 AM GMT  |  Blog: SQL Server with Mr. Denny   |      SQL
Stating the Obvious- Windows 7 Should Be Secure

Blog  I stumbled across an article recently titled 10 Reasons Why Reliable Windows 7 Security is Critical to Users. I use and write about Windows 7 and I tend to specialize in the information security side of things, so I thought I would check it out to see what wisdom I could glean. Here is what I learn...

Last updated: Oct 16, 2009   1:53 PM GMT  |  Blog: Tech Strategy Trends
How women in technology expand the cloud horizon

Blog  Cloud computing has been around for more than a decade and has matured at a remarkable rate. Today, most organizations cant imagine surviving without the cloudeven if they still host some resources on premise. With technological maturity comes increasing complexity. Heres an exploration of ...

Last updated: Oct 1, 2018   11:39 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
The shape of things to come advanced networking security for the IoT

Blog  There is all sort of potential for IoT-related (Internet of Things) applications to streamline business processes and provide new ways of interacting with customers. This was recognised by a cross section of industry sectors surveyed in a new Quocirca report that covered the UK and German speaking r...

Last updated: Oct 24, 2016   8:22 AM GMT  |  Blog: Quocirca Insights
The cloud migration checklist: What to consider

Blog  In this guest post, Sarvesh Goel, an infrastructure management services architect at IT consultancy Mindtree, offers enterprises a step-by-step guide to moving to the cloud. There are many factors that influence the cloud migration journey for any enterprise. Some of them may trigger change in the w...

Last updated: Dec 17, 2015   9:00 AM GMT  |  Blog: Ahead in the Clouds   |      Cloud Computing, Guest Post, Skills
Can Germany really ban hacking tools?

Blog  This week's Security Blog Log roundup starts with Germany's stunning move to ban hacking tools. I use the word stunning because I don't see how any government could possibly enforce such a thing. According to The Register, Germany is updating its criminal code to define denial-of-service attacks an...

Last updated: Jun 1, 2007   8:56 AM GMT  |  Blog: Security Bytes
Creativity makes information security awareness training stick

Blog  It often seems security pros place great expectations on users, and are amazed when they fall for an obvious security trap or common social engineering attack. But instead of being amazed, the more appropriate response may be to recognize that traditional information security awareness training prog...

Last updated: May 3, 2012   12:04 AM GMT  |  Blog: Security Bytes
Trusted Computer Solutions shores up security methods with CounterStorm

Blog  As threats become less predictable and more targeted, security technologies have shored up their methods and devised additional precautions to secure company systems. With its acquisition of CounterStorm, a government-run security software company, Trusted Computer Solutions (TCS) has done just that...

Last updated: Oct 7, 2008   3:53 PM GMT  |  Blog: Enterprise Linux Log
Biztalk Identity Services...

Blog  In trying to get my head around Biztalk identity services I've been going through the examples for the identity services provided by BizTalk and from the Biztalk Labs, the concept of identity services makes perfect sense. However, and it might very well be my ignorance (read disclaimer :-)), I'm not...

Last updated: Jan 23, 2008   3:58 AM GMT  |  Blog: Service Endpoint   |      Development, SOA, WCF
VMworld 2013 : VMware vCloud Hybrid Service: Now Available

Blog  Only for U.S. customers though. Do you want the easiest way to extend your datacenter into the cloud, with none other than VMware themselves? Well check this out! I am pleased to announce that we are rapidly expanding service capacity with new, state-of-the-art, data centers in Santa Clara, Calif. a...

Last updated: Aug 26, 2013   11:13 PM GMT  |  Blog: The Real (and Virtual) Adventures of Nathan the IT Guy
The machine that goes IDaaS-Ping!

Blog  Ping (the identity defined security company, not the golf club company) has previewed its PingOne for Customers tool for developers The is cloud-based Identity as a Service (IDaaS) software for programmers to use -- it provides API-based identity services for customer-facing applications. The pr...

Last updated: Dec 4, 2018   9:40 AM GMT  |  Blog: CW Developer Network
Okta to developers: get identity out of shadow IT

Blog  Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to attempt to explain how software application developers should approach identity as a key element of user (and device) authentication control in the way modern applications are being built. The firm i...

Last updated: Aug 30, 2017   4:57 PM GMT  |  Blog: CW Developer Network
SAP ramps up risk and compliance

Blog  SAP and Cisco announced a broad partnership today that integrates the SAP NetWeaver platform with Cisco’s services-enabled network architecture. SAP will also launch three new applications that address governance, risk and compliance called the SAP GRC Repository, SAP GRC Process Control and S...

Last updated: Sep 6, 2006   2:25 PM GMT  |  Blog: SAP Watch
Building open source health care applications, and other health IT news

Blog  If a government-funded platform for an open source app store for health care takes off, the 99-cent EHR system could be coming soon. Two doctors from Children's Hospital Boston have been awarded a $15 million Strategic Health IT Advanced Research Projects, or SHARP grant to help fund their vision of...

Last updated: Jun 15, 2010   7:47 PM GMT  |  Blog: Health IT Pulse   |      CMS, EHR implementation, health information exchange
The Smart Cube: so smart you can’t see it

Blog  David Vasta at the System i Blogger blog wonders what all this talk about the new IBM Smart Cube is: The Smart Cube from IBM has been getting lots of talk around the web, just not much from IBM? I want to see some real details and when I go to IBMs web site and search for Smart Cube, I get ...

Last updated: Dec 11, 2008   1:44 PM GMT  |  Blog: The iSeries Blog
Instaclustr anomaly detection scaled to 19 billion

Blog  The instant clustering aficionados at Instaclustr have created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale 19 billion events per day. They did it by using open source Apache Cassandra and Apache Kafka and Kubernetes container o...

Last updated: Jun 3, 2019   8:14 AM GMT  |  Blog: Open Source Insider
links for 2008-04-08

Blog   Enigmatec and Scalent Announce Integration Partnership On "Network, Database, and System Log Data Management: The What, Why, and How" Tideway Secures $27 Million in Series C Funding Impressive funding round...brings total funding to $37.5M. Expect some significant expansion as th...

Last updated: Apr 8, 2008   6:33 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
Capture SQL Server logged in db User name in Access 2007 Accdb

Answer  I have a SQL Server 2005 backend with an Access 2007 Accdbfront-end application. Security has been established via SQL Server database user groups with associatedtable-level permissions. I would like to disable certain form functionalitybased on the logged in user. Is there a way to"capt...

Last updated: Aug 24, 2009   11:14 PM GMT   |    Access 2007 security, Microsoft Access, Microsoft Access 2007
PREV 1...10   20   30...43   44   45   46   47   48   49   50   51   52...   60   70   80...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: