Welcome!


Security

One of the major criticisms of private clouds is that the end user still has to build, manage and maintain the infrastructure to the extent that they are continuing the ‘keeping the lights on’ approach of IT. Ultimately this lacks the economic benefit that makes cloud computing such an...
Designing and implementing a hybrid encryption application is a big challenge but without a supporting infrastructure it’s almost impossible. There are open source libraries that allow you to encrypt a file but only provide the translation technique. After the information has been encr...
Backup of enterprise information and associated data protection are fragmented, complex, and inefficient. But new approaches are helping to simplify the data-protection process, keep costs in check, and improve recovery speed and confidence. If you look back 20 years ago, we had heter...
Based on different reports of companies in New York still caught “off-guard” with their computer systems, it is hard to believe that corporate computer systems are down for some major companies – especially financial ones – and there are no redundant systems up-and-running. What happe...
Businesses must exploit open collaboration advances in procurement and finance to produce new types of productivity benefits, say an industry analyst and Ariba executive. And the benefits of improved data integration and the process efficiencies of cloud computing are additionally hel...
The “consumerization of IT” is a topic we’ve heard a lot about recently – especially when it comes to “Bring Your Own Device (BYOD).” One area that is less talked about, yet a growing trend under the “consumerization” umbrella, is the use of free, consumer-type file transfer services i...
Earlier this week, the Massachusetts Eye and Ear Infirmary and Massachusetts Ear and Eye, Inc. (MEEI) agreed to pay a hefty $1.5 million settlement to the U.S. Department of Health & Human Services for alleged HIPAA violations. According to MEEI, a personal laptop that contained unencr...
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network vulnerabilities; however, several of the leading Intrusion Detection/Protection systems ...
Identity theft, password breaches, viruses and worms, phishing attacks, Stuxnet—the more we rely upon technology in our increasingly connected world, the greater the risk that we’ll be hacked. Even worse, it seems that the rate at which hacking stories come across the wire is actually ...
Today’s software development is geared more towards building upon previous work and less about reinventing content from scratch. Resourceful software development organizations and developers use a combination of previously created code, commercial software, open source software, and th...
Data explosion is one of the biggest issues facing IT today. The amount of data that organizations store has grown exponentially in the last 10 years. According to Gartner research director April Adams, data capacity on average in enterprises grows at 40 percent to 60 percent year over...
There's been a flurry of discussion this week among Internet and Web standards heavy-hitters around WebSocket, the new communications protocol supported in Chrome 4 and Safari 5. What was the main issue? Is there some kind of fundamental security vulnerability with the WS protocol? Web...