Search Results | Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...914 NEXT
Sort by:  Most Relevant  |  Date
WMOC#11 - Zermatt!

Blog  Steve Maine - Zermatt: Claims-based identity for ASP.NET (and more!) Vittorio Bertocci - Announcing the Beta release of Zermatt Developer Identity Framework Dominick Baier - CLR Security Site on Codeplex, Skiing in "Zermatt" Dare Obasanjo -Network Attached Memory: Terracota as an Alternativ...

Last updated: Jul 16, 2008   9:15 PM GMT  |  Blog: Service Endpoint   |      Architecture, c#, Design
WSDAC#28 - IronPython 2.0 Released

Blog  Stefan Tilkov - Everything Becomes LispAWS Editor - Amazon SQS Resources High scalability blog -Scaling MySQL on a 256-way T5440 server using Solaris ZFS and Java 1.7 Harry Pierson -IPy RTW FTW! Todd Hoff - Strategy: Facebook Tweaks to Handle 6 Time as Many Memcached Requests Werner Schuster - P...

Last updated: Dec 17, 2008   4:28 AM GMT  |  Blog: Service Endpoint   |      agile, Architecture, azure
Cloud Computing, SAP, PeopleSoft, Html and Security are skills in Demand

Blog  Dice this week released its January 2011 report, which detailed the skills most in demand in the IT industry. Basing its data on the number and types of job postings available, Dice determines what types of technical expertise are most in demand. According to the career Web site, skills requests ...

Last updated: Jul 27, 2011   9:48 PM GMT  |  Blog: IT Project Management   |      cloud computing, HTML, Security
Next pass on Data Center Automation "Blueprint"

Blog  Thanks for the feedback, I've incorporated some points that have been made into an updated version of the Data Center Automation Blueprint (DCAB). As mentioned previous this is a work in progress and I love getting feedback, ideas, concerns etc. with the model. As mentioned previously I'm trying...

Last updated: Dec 17, 2007   5:59 PM GMT  |  Blog: Adventures in Data Center Automation   |      Application monitoring, CMDB, DataCenter
Great write-up on Security Managment activities this year

Blog  I have Security as one of the 6 DCAB Functional Categories. This article does a great job highlighting some key landscape changes in the overall Security Management market (some items are beyond what is covered by this blog). As it relates to monitoring/managing the security of the data center t...

Last updated: Dec 27, 2007   6:04 PM GMT  |  Blog: Adventures in Data Center Automation   |      EMC, HP Software, IBM Tivoli
Building out a reference model for data center monitoring/automation

Blog  So as this blog is just getting rolling I'm quickly realizing I need to come up with a graphical reference model, key approaches and metrics to reference. So to get that process started, i'm going to brainstorm some items here and hope to get some feedback on areas I should make sure I don't forget...

Last updated: Nov 6, 2007   5:17 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter, Network monitoring, Performance management
Automating security, risk & compliance for your data center

Blog  Time for a quick side bar from our reference model discussion. Just wanted to make a quick, timely mention for a space that's is evolving currently called IT Governance, Risk & Compliance Management or "IT GRC" (as defined by Gartner, Forrester, EMA, IDC). This is an emerging space that help...

Last updated: Nov 12, 2007   5:25 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter, Security, Securitychannel
Webcast: 'The Inside Story on Compliance: Confessions of a QSA'

Blog  This blog post contains my tweets from the webcasts premiere episode in December. The Inside Story on Compliance: Confessions of a QSA is now available for download (free registration may be required). *** Two webcasts premiering now. First up: The Inside Story on Compliance ...

Last updated: Jan 5, 2009   9:46 PM GMT  |  Blog: IT Webcasts   |      BI, biometrics, compliance
Hello world!

Blog  Welcome to IT Knowledge Exchange. This is an example of your first blog post. You'll need to delete this example blog post and the attached example comment before your blog goes live. Let me know if you have any questions. Thanks. (Brent)

Last updated: Feb 6, 2009   0:00 AM GMT  |  Blog: The Security Viewpoint   |      Security
IT: The department of no

Blog  Did you ever have the impression that users think of their IT support staff as the department of no? A frustrated user recently approached me with: You guys have this system so locked down we cant do anything. With security as the number one network concern, I can see why users would think ...

Last updated: May 29, 2009   3:49 PM GMT  |  Blog: Business Intelligence Technology   |      IT department, IT support, Security
The future of trustworthy computing

Blog  The departure of security guru Steve Riley from Microsofts Trustworthy Computing Group last week raises questions on the direction of Microsoft in the security arena. The move was termed a restructuring. Under the current economic conditions, many companies are now using this line to justify cutt...

Last updated: May 14, 2009   7:48 PM GMT  |  Blog: Business Intelligence Technology   |      Microsoft, Security, software
HP bought 3Com

Blog  Why? Couple reasons: Ethernet switching, routing solutions, and networking security capabilities to augment HP's ProCurve networking line. In other words, HP plans to begin taking share in Cisco's long-unchallenged domain. Additionally, this move strengthens HPs position in China, which i...

Last updated: Nov 12, 2009   7:44 PM GMT  |  Blog: You're using your OS for what?   |      3Com, Cisco, HP
New Advisories From Ciscos PSIRT

Blog  Yesterday saw Ciscos Product Security Incident Response Team (PSIRT) release details of 6 new security vulnerabilites, five of which affect IOS based platforms and the sixth one affecting their Unified Communications Manager, details of all of the vulnerabilities can be seen by following the links i...

Last updated: Sep 23, 2010   12:36 AM GMT  |  Blog: Packet Blog   |      Cisco, IOS, PSIRT
Wireless Security.

Blog  One member of the the Q and A website posted a question recently: Wireless Security on a Belkin Router This got me thinking about how many times I have seen huge lists of open access points from my mobile devices. It would appear that even with simplified web based GUI interfaces that a lot of hom...

Last updated: Aug 12, 2010   4:21 PM GMT  |  Blog: Packet Blog   |      Networking, Security, Wireless
Avast builds on Android anti-malware pedigree with new HQ

Blog  Avast Software was kind of 'one of those Central and Eastern Europe' (CEE) security firms along with the other usual suspects that most of us can name... and then, it kind of became something more than that and started to boast more users than its competitors -- so that then... consequently, it has ...

Last updated: Jan 24, 2016   10:06 AM GMT  |  Blog: Open Source Insider   |      Avast, Security
Intel: the only Hadoop is secure Hadoop

Blog  Intel's MD of worldwide professional services Aaron Davies-Morris has been speaking at the Hadoop Summit 2013 in San Jose about his firm's drive to work with the open source Hadoop Java-based programming framework. Hadoop's key feature hinges around its support for the processing of large data sets...

Last updated: Jun 27, 2013   11:40 AM GMT  |  Blog: Open Source Insider   |      Intel, Open source, Security
Open source HTML5 secure file sync for Android

Blog  File sync specialist SpiderOak has bolstered the Google Play Android app market with an open source secure sync tool. SpiderOak is emphasising the secure (no, really, really secure we really mean it) aspect of its technology by detailing the fact that at no point does the company ever store users' ...

Last updated: Jun 12, 2013   2:44 PM GMT  |  Blog: Open Source Insider   |      Android, Security, sync
In IoT, Data matters more than Things and here's why

Blog  IoT Back to Basics, chapter 1: The Internet of Things (IoT) is placing unprecedented demands on data storage, networking, processing and analytics. For end users, vendors and investors, it represents a challenge as well as a huge opportunity. But which five data processing and analytics technologies...

Last updated: Jan 22, 2018   2:59 PM GMT  |  Blog: Write side up - by Freeform Dynamics   |      Analytics, In-memory data grids, iot
Where are security and data governance in IoT?

Blog  IoT Back to Basics, chapter 3: Its no surprise that security and governance are important considerations when it comes to the IoT, but quite how incredibly important they are may not be immediately obvious. Ensuring that users of IoT systems and smart devices remain safe and secure which req...

Last updated: Feb 22, 2018   1:45 PM GMT  |  Blog: Write side up - by Freeform Dynamics   |      attacks, Data governance, Hackers
Docker's oyster has security in the shell

Blog  Goodness isn't it all about the containers these days? Actually, scratch that, isn't it all about the container security debate these days? As recently explained here, a container is a specific place to run an application alongside its own dependencies, configuration files, libraries and the 'runt...

Last updated: Nov 17, 2015   12:15 AM GMT  |  Blog: Open Source Insider   |      Docker, Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...914 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: