This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The acquisition is expected to close later this year and will boost Cisco’s security portfolio and strategy. “The notion of the ‘perimeter’ no longer exists and today’s sophisticated threats are able to circumvent traditional, disparate security products. . December 2012 (151). November 2012 (152).
MapR M7 is now available on Amazon Elastic MapReduce, Fruit of the Loom implements a Teradata Data Warehouse, and HP updates its ArcSight Security Analytics portfolio using big data to protect critical information and mitigate risk. HP uses big data for unified security analytics. December 2012 (151). November 2012 (152).
DataStax raises $45 million to expand its product development and channel growth, Cloudera adds an Apache security module for Hadoop, and Univa and MapR partner on enterprise-grade workload management for Hadoop. Cloudera adds Security Module for Hadoop. December 2012 (151). November 2012 (152). October 2012 (182).
Since TalentWise manages sensitive candidate and employee data, it must meet stringent data security and compliance requirements, including the Experian Independent 3rd Party Assessment (EI3PA) and Payment Card Industry Data Security Standards (PCI DSS) designed to protect Personally Identifiable Information (PII). December 2012 (151).
The growing demand for secure infrastructure by businesses in the Pacific Northwest makes Telx’s commitment to Seattle an important long-term investment for our continued growth. He has served many roles in the data center, including support, system administration, webdevelopment and facility management. December 2012 (151).
”As clients create smarter computing environments, they are looking for ways to manage IT costs and complexity without sacrificing security or the ability to scale,” said Greg Lotko, IBM business line executive, System z. December 2012 (151). November 2012 (152). October 2012 (182). September 2012 (134).
I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Good Read: Web 2.0 Security Dangers. Labels: security , web 2.0. ► 2012. (17).
Learning with Codecademy will put you on the path to building great websites, games, and apps. link] (various webdevelopment tutorials). Computer Security Class – Presented by Stanford University, February 2012. It’s interactive, fun, and you can do it with your friends. Learn to Code Here.
Storage and big data companies Scality and WebAction receive funding to advance their offerings, and Avere Systems is selected for the Library of Congress and South American web hosting company Locaweb. Scality secures $22 million. December 2012 (151). November 2012 (152). October 2012 (182). September 2012 (134).
Without a doubt, WordPress is the most popular websitedevelopment platform on the planet. This CMS is used by an increasing number of websitedevelopers to support around 75 million sites worldwide. We think that these eight tools are among the essential plugins for every websitedeveloper.
The problem is that the SaaS vendor has to solve two fundamental technology problems: (a) writing and supporting really good software and (b) hosting many customers at competitive service levels and required security. saas security mobile security cloud security data safety data integrity Reply Delete Add comment Load more.
Is the environment secure? software development. (51). webdevelopment. (12). ► 2012. (17). See a different working environment - Is the physical space, computing equipment, and other environmental conditions conducive to high productivity and collaboration? product management. (26). project management. (50).
Usage patters from a small subset of users can undermine performance for many users Security is a battle. software development. (51). webdevelopment. (12). ► 2012. (17). Actions from one person affect many users in unique ways. I tweet, my 500 followers get updates in real time. product management. (26).
Requirements are more complex covering concerns like security, business continuity, internationalization and many others. software development. (51). webdevelopment. (12). ► 2012. (17). And applications typically have more complex integration needs. product management. (26). project management. (50).
Project managers help manage all the external dependencies including vendors, suppliers, partners, infrastructure teams, security concerns, etc. software development. (51). webdevelopment. (12). ► 2012. (17). Some specifics: Scrum and agile are very team and inward facing. product management. (26).
Yes, that exposes issues of security, privacy, and intellectual property. software development. (51). webdevelopment. (12). ► 2012. (17). Why CIOs need to put Enterprise 2.0 High on their Agenda Heres the issue - these tools are getting more sophisticated and more usage. product management. (26). TechCrunch.
Security teams and other enterprise functions will often impose requirements onto the software team. software development. (51). webdevelopment. (12). ► 2012. (17). Other IT teams may not be so agile. Heres another issue. product management. (26). project management. (50). social media. (3). software qa. (8).
Diagnostics and troubleshooting should be easy - If the development or operations team need to call the platforms Technical Support, then thats a big red flag. Well defined security model - Security capabilities often need to be evaluated prior to any prototyping, so the model and capabilities need to be well defined and easy to leverage.
Im not sure if there will be sufficient funding available for ongoing development. I need to develop the big strategy to gain organizational momentum and secure funding, but dont know how to sell the baby steps. software development. (51). webdevelopment. (12). ► 2012. (17). social media. (3).
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content