Search Results | Application security
PREV 1...10   20   30...45   46   47   48   49   50   51   52   53   54...   60   70   80...251 NEXT
Sort by:  Most Relevant  |  Date
Cybersecurity risks affect IIoT fog computing

Blog  Cloud computing within IIoT is creating new opportunities for manufacturers and industrial systems. From connected cars and smart cities to real-time analytics and 5G mobile, IIoT sensors are generating data in unprecedented volumes. Since most essential smart factory services would be inefficient ...

Last updated: Nov 27, 2019   4:29 PM GMT  |  Blog: IoT Agenda   |      Cyberattacks, cybersecurity, encrypted communications
Examining the foundations of trusted IoT: Connect. Secure. Monetize.

Blog  We are entering the fourth industrial revolution. The emerging internet of things is fusing our physical and digital worlds in ways that are dramatically changing the landscape of business, industry and day-to-day living. The potential for the industrial IoT alone is staggering. Over the next 15 yea...

Last updated: Feb 24, 2017   7:42 PM GMT  |  Blog: IoT Agenda   |      Connectivity, Data monetization, Enterprise IoT
Alcatel-Lucent pushes envelope with Open API Service expansion

Blog  Alcatel-Lucent has expanded its Open API Service with a group of new "bundled APIs" that combine third-party and service provider elements to create functional building blocks with a more application-oriented slant. The first offering is a trio of bundles designed for social applications, including ...

Last updated: Mar 18, 2010   6:58 PM GMT  |  Blog: Uncommon Wisdom
Microsoft Patch Tuesday Update - 11th January 2011

Blog   With this Microsoft Patch Tuesday update, we see a very small set of updates in comparison to the massive updates from last year's November and December updates. In total there are 2 updates with the following rating; 1 Critical and 1 rated Important. Given the nature of the changes and updates in...

Last updated: Jan 12, 2011   10:19 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Uncategorized
NXP: automotive semiconductor market is a multi-lane highway

Blog  Dutch semiconductor specialist continues its drive at Mobile World Congress in the Catalan capital of Barcelona this week with a series of announcements no doubt saved up specially for the occasion. Multi-lane highway The firm has fingers in several industry pies (from entertainment and onwards) but...

Last updated: Feb 28, 2017   9:14 AM GMT  |  Blog: CW Developer Network
Will R2's DirectAccess leave you vulnerable?

Blog  Were continuing to drill into the big new Windows Server 2008 R2 features on the site, the latest of which is Microsofts new DirectAccess technology. For those who dont know, the feature is new to R2 and Windows 7, and is designed (as Microsoft puts it) to give users the experience of be...

Last updated: Jul 9, 2009   1:40 PM GMT  |  Blog: The Windows Server Notebook
Diving with Dolphins in Cambridge - what new technologies are on the horizon

Blog   Some interesting new technologies grabbed the eye at the Diving with Dolphins event in Cambridge. Some of them are already in production and being trialled by businesses and organisations, such as a securer way to do online banking and a social networking tool for use between patients and their cli...

Last updated: Sep 23, 2009   3:45 PM GMT  |  Blog: Computer Weekly Editor's Blog   |      Cronto, EmotionAI, Omniplug
It's true: Facebook can bite

Blog   Although the danger of social media to job seekers has been running through the rumour mill for some time, an Australian survey proves it is true that careless postings can come back and bite. The research found that 12% of employers have rejected job applicants based on what they have found on the...

Last updated: Nov 28, 2011   9:03 AM GMT  |  Blog: Downtime   |      Employment, Facebooki, social media
Do I need digital certificates to be sox compliant?

Answer  Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale o...

Last updated: Jun 8, 2009   3:13 PM GMT   |    Digital certificates, Sarbanes-Oxley Act, SOX
Capture SQL Server logged in db User name in Access 2007 Accdb

Answer  I have a SQL Server 2005 backend with an Access 2007 Accdbfront-end application. Security has been established via SQL Server database user groups with associatedtable-level permissions. I would like to disable certain form functionalitybased on the logged in user. Is there a way to"capt...

Last updated: Aug 24, 2009   11:14 PM GMT   |    Access 2007 security, Microsoft Access, Microsoft Access 2007
Can we host a PCI compliant application on Azure?

Answer  I've been trying to host an application on Windows Azure that would store people's credit card information of users who would want to buy monthly subscriptions for a monthly fee. We just have to store the card data as secure as possible. And we know we have to be PCI compliant. Will Azure allow us t...

Last updated: Jul 13, 2015   6:13 PM GMT   |    PCI compliance, PCI DSS, Windows Azure
What's the best service storing PCI sensitive data?

Answer  I'm looking to build a web application that's going to handle sensitive PCI data (including banking numbers). What's the best service that can handle all of this data? My friend told me about Rackspace but I'm not sure about its PCI solution. I just need to make sure the database is secured and I on...

Last updated: Jul 14, 2015   3:42 PM GMT   |    Data storage, PCI, PCI compliance
links for 2008-04-08

Blog   Enigmatec and Scalent Announce Integration Partnership On "Network, Database, and System Log Data Management: The What, Why, and How" Tideway Secures $27 Million in Series C Funding Impressive funding round...brings total funding to $37.5M. Expect some significant expansion as th...

Last updated: Apr 8, 2008   6:33 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
Updating data to 3rd party without jeopardizing Lotus Notes security

Answer  Hi, My team and I are stuck. A 3rd party needs access to certain information on our Lotus Notes database about clients statusand we are unsure on how to go about this without jeapodising security and firewalls. We've thought of a web based application for the 3rd party however how will we send the...

Last updated: Nov 15, 2010   10:04 AM GMT   |    Database security, Lotus Notes, Lotus Notes 6.5
NGINX release 7: what is an application delivery platform anyway?

Blog  Whether we list the firm as nginx or NGINX, it is neither an acronym, a portmanteau or a shortening. The company nginx is pronounced "Engine-Ex" and the firm is a specialist in software engine deliver technology -- so, it's an application delivery platform. So what is an application delivery platf...

Last updated: Sep 17, 2015   7:37 AM GMT  |  Blog: CW Developer Network   |      NGINX
Challenges hinder Salesforce Lightning, Wave adoption

Blog  In an effort to make analytics and application development more user-friendly, Salesforce rolled out two new products, Wave and Lightning, at last year's Dreamforce conference. Lightning enables users to develop their own applications and Wave is a data visualization tool built into Salesforce1, the...

Last updated: Oct 7, 2015   8:44 PM GMT  |  Blog: CRM in Focus
Recommendation: system process using a mapped drive

Answer  My Setup: Server A: Win2k / Access2000 Server B: Win2k3 / Access2007 I have a syncing application that will look for changes on my ServerB database, and replicate those changes to the ServerA DB. This application is based around a mapped drive. What I am trying to secure is a method that will wor...

Last updated: Mar 14, 2008   12:37 AM GMT   |    Mapped drives, Network, UNC path
What are the benefits of Database Approach?

Blog  The benefits of database approach is to 1.reduce redundancy of information Datas are being made simple and complex, we dont have to input as many datas which can only result in overloaded space in computer hard disk/ memory. 2.Consistent data flow Once the datas are being analyzed i...

Last updated: Feb 25, 2008   4:12 AM GMT  |  Blog: RDBMS in Oracle/SQL
US military approves Genband communications kit

Blog  Genband has used its Orlando-located Perspectives16 user/customer/partner/developer event to announce news of US military graded approval for its communications technology. [caption id="attachment_824" align="alignright" width="300"] Bad news for bad guys: the US defense team is packing extra commu...

Last updated: May 4, 2016   10:52 AM GMT  |  Blog: CW Developer Network
In exit memo, Ozzie points Microsoft toward cloud: Is he right?

Blog  Tech guru Ray Ozzie is leaving Microsoft, and in the wake of the announcement, a memo from Ozzie was leaked to the media. In the memo, Ozzie asks Microsoft to confront an age without PCs, an age in which Microsoft's traditional PC incumbency would be meaningless. What Ozzie is looking at is whether...

Last updated: Oct 26, 2010   12:55 AM GMT  |  Blog: Uncommon Wisdom
PREV 1...10   20   30...45   46   47   48   49   50   51   52   53   54...   60   70   80...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: