Search Results | Application security
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...249 NEXT
Sort by:  Most Relevant  |  Date
Apple's security 10 years behind Microsoft's?

Blog  In light of the recent Flashback Trojan that infected an estimated 600,000 Mac users last month, industry experts are discussing Apple's security. The perception has always been that Apple's OS is more secure than Microsoft's. This was led by the misconception that Apple computers could not be infec...

Last updated: May 14, 2012   4:04 PM GMT  |  Blog: Security Corner
The Four D's of Cyber Security: Deny, Discriminate, Detect, & Destroy

Blog  This is an interesting and sensible approach to security. I would call these the "Logics of Cyber Security" because they're so basic they could well be the principles upon which all cyber security can be based. The paper's authors call them "first principles," defining such as "...a basic foundati...

Last updated: Oct 21, 2008   5:00 PM GMT  |  Blog: Security Corner
iPhone jailbreaking exploit sparks mobile security concerns

Blog  Jailbroken phones are more prone to security threats, researchers say. The emergence of an exploit used by a website for iPhone "jailbreaking" prompted security researchers to issue warnings about smartphone security. The website, Jailbreakme.com, allows iPhone and iPad users who visit the site ...

Last updated: Aug 4, 2010   4:25 PM GMT  |  Blog: Security Bytes
Database security: Top 10 database vulnerabilities list

Blog  New vulnerabilities list outlines the most common database problems that could lead to a costly data breach. Database administrators are all too familiar with the issues outlined in Application Security Inc.s new Top 10 database vulnerabilities list. From the use of default passwords to patchin...

Last updated: Jun 3, 2010   1:53 PM GMT  |  Blog: Security Bytes
Are you ready to support Oracle on the iPhone?

Blog  That screaming you heard today? That was the sound of hundreds of IT professionals reacting to the Apple App Store created today for the new iPhone. A 3G version of the phone is being released this week and enterprise software vendors are beginning to take notice, giving credibility to the iPhone in...

Last updated: Jul 11, 2008   2:21 PM GMT  |  Blog: Eye on Oracle
Application servers,Network solution

Answer  Hi, This is IT department of a Engineering college We r facing several security related issues We have 500 Desktop PCs We want to have labs of different application servers We are having 7 soried building having 12 Computer labs Each lab having 40 machines Network to be standardised in a way tha...

Last updated: Dec 16, 2007   3:19 PM GMT   |    Network connectivity, Network design, Unix Servers
How do you scale B to B database and application servers on AWS?

Answer  I am working with a company that is business to business. The businesses that are our customers are very concerned about their data. They want to make sure they have max security. I am wondering if it is practical to have a separate application server and separate database for each business. I...

Last updated: May 13, 2015   9:44 PM GMT   |    AWS, Security
connecting two networks to a single server (2 NIC's or router?)

Answer  I have a 2003 server box running a simple database application that needs to be accessed by users on two physically separate networks. One network is DHCP 192.x.x.x the other is static 223.x.x.x. Everyone is running XP pro. What would be the better option. Two NIC's in the server, one for each n...

Last updated: Feb 13, 2009   5:37 PM GMT   |    DHCP, Microsoft Windows Server 2003, Microsoft Windows XP
Cloud migration

Blog   "Cloud computing promises many benefits: It can reduce IT costs and downtime while vastly increasing storage, mobility and provisioning options. But, it's also a potential security nightmare: perimeters disappear, clients and servers move around at will, and old models of access control, authent...

Last updated: Jul 4, 2012   6:38 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
What's the Buzz about Beehive

Blog  Just looked at a demo of Oracle's Beehive that provides an integrated set of collaboration services built on a single, scalable, open, and enterprise-class collaboration platform. Beehive allows users to access their collaborative information through familiar clients while enabling IT to cons...

Last updated: Mar 31, 2009   1:06 PM GMT  |  Blog: Collaboration Technology 2.0   |      Beehive, Oracle
Tackling Big Ideas and Issues at CA World (Sponsored)

Blog  What are some of the issues around technology that are keeping you up at night? That was one of the questions, among many others, put to a stellar panel of executives last night at a session here at CA World 2011 in Las Vegas. The session itself made good use of some of the disruptive technology the...

Last updated: Nov 15, 2011   1:58 PM GMT  |  Blog: Enterprise IT Watch Blog
In the fast-growing field of sports analytics, SD-WAN is the power hitter

Blog  With all of the concern over AI and the loss of jobs it could entail, no one is talking about the imminent demise of TV color commentators. And yet, improbable as it may seem, the likes of Howard Cosell and Bob Costas might just be replaced someday by an algorithm. An offshoot of data and video anal...

Last updated: Apr 25, 2019   5:30 PM GMT  |  Blog: IoT Agenda   |      ai, Analytics, Automation
Converting Upsized MS Access/SQL database and application to ASP.net for the web

Answer  I have no experience wih ASP or web server based applications, but I have an Access program that I need to put on the web. What is the easiest route to full web implementation for a program that is currently using Access as the front end for a 200+GB db? The application needs to be secure. It con...

Last updated: Oct 17, 2004   5:46 PM GMT   |    ASP.NET, SQL
Cisco ASA-X - CX Module

Blog  Hi all, The ASA-X series has many benefits including higher throughput and an IPS that can be installed by simply adding a license key to the ASA-X series. But what about context based security? For example, lets say that you want to block FaceBook for people that use Macs (because you don...

Last updated: Mar 31, 2012   1:13 PM GMT  |  Blog: TechStop
ITKE Twitter security chat (February 25th)

Blog   Twitter image via Shutterstock It's almost the end of the month...do you know what that means? It's time for another #ITKESecurity Twitter chat! Our experts, including Kevin Beaver, Jeff Cutler and Ken Harthun will be returning on February 25th at 1 PM (EST). And what will be the big topic? This m...

Last updated: Feb 18, 2015   3:22 PM GMT  |  Blog: ITKE Community Blog   |      Disaster Recovery, ITKE, twitter
IBM cloud marketplace: not late, just deeper

Blog  IBM has launched a new cloud marketplace to coalesce its own portfolio of cloud services (and those of third-party providers) and provide a developer-facing ecosystem. IBM claims that today, there is a US$250 billion cloud market opportunity. So what is IBM opening up here? Well, Big Blue says th...

Last updated: Apr 29, 2014   2:09 PM GMT  |  Blog: CW Developer Network   |      cloud, IBM, Software
Ten questions to ask a cloud supplier before moving your IT

Blog   Cloud computing has been hijacked by the IT suppliers. Let's face it people have been accessing applications via web browsers for a long time.OK strictly speaking the cloud is multitenant, pay as you go blah blah blah... But many of the services being sold as cloud services don't meet the strictly ...

Last updated: May 2, 2014   10:40 AM GMT  |  Blog: Investigating Outsourcing   |      Uncategorized
Rackspace: does multi-cloud mean multi-threat?

Blog  Rackspace continues to try and evidence, validate and clarify the use of its 'hey, we're the managed cloud company' tagline by hosting a series of press-facing debates throughout London in 2016. Opting for a'trendy if you've got a beard' location in Shoreditch just a stone's throw from London's g...

Last updated: Oct 14, 2016   10:25 AM GMT  |  Blog: CW Developer Network
Readers respond: What's the biggest barrier to cloud adoption?

Blog  There's a litany of reasons why enterprises don't want to buy public cloud services, but sunk investments in legacy IT tops the list, according to TechTarget's recent Cloud Pulse survey. Looking over the results, I thought about how this adoption barrier might be more difficult to overcome than, sa...

Last updated: Oct 8, 2012   9:23 PM GMT  |  Blog: Cloud Provider Commentary
New Cloud Daddy CEO aims to 'tell the world' about AWS protection

Blog  The new CEO of AWS data protection provider Cloud Daddy is looking to tell his company's story and drastically increase its customer count. "We've got to get people to know about Cloud Daddy," said Spencer Kupferman, the former president and CEO of reporting and automation platform provider Global ...

Last updated: Jun 21, 2019   12:46 AM GMT  |  Blog: Storage Soup   |      Cloud Backup
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: