Blog Posts Tagged with "Cloud Computing"
February 12, 2011 Added by:Ben Kepes
As the cloud computing trends continue to inundate the IT market, organizations must seek ways to ensure capacity required to run business critical applications. During the shift to the cloud, capacity must be available and current infrastructure needs to maintain a strong hold on efficiency...
February 05, 2011 Added by:Rahul Neel Mani
Organizations look at it as I have to protect my data either for importance or compliance reasons, maintain it and have it totally secure. Whether it be the aspect of authorization, authentication, or encryption of the data, information management security becomes a key component...
February 02, 2011 Added by:Marjorie Morgan
Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...
January 29, 2011 Added by:Rahul Neel Mani
Eng Lin Goh, CTO, SGI in a conversation with Geetaj Channana on the evolution of the company after its takeover by Rackable, and their contribution to cloud computing and high-performance computing in the enterprise...
January 27, 2011 Added by:Kevin L. Jackson
Recently I had the awesome experience of participating in a global tele-presence conference on government cloud computing. A key takeaway for me was that pre-integrated cloud infrastructure solutions have been credited with reducing the non-recurring engineering cost of private clouds...
January 21, 2011 Added by:Rahul Neel Mani
Peter Coffee, Head of Platform Research for Salesforce.com discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...
January 21, 2011 Added by:Mark Evertz
It's a never ending journey that unearths painful truths, nerve-wracking challenges to your beliefs and confidence, and it keeps it's clutches in you with the lure of fighting the good fight or making an obscene amount of money and wreaking havoc on the world if you're donning the black hat...
January 21, 2011 Added by:Danny Lieberman
Obviously, the standard was written by system administrators and not programmers because the notion of inter-process communications is ignored. Once we are running online transaction applications in the cloud, the notion of public networks becomes an antiquated given...
January 20, 2011 Added by:Headlines
The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...
January 19, 2011 Added by:Danny Lieberman
Access to confidential information or embezzlement of funds is just some of the possible internal security breaches that can be performed by employees or former employees. Because employees are the most familiar with internal systems, detection can be made extremely difficult...
January 16, 2011 Added by:Jack Anderson
A task based methodology is key to providing a step by step process ensuring a complete and comprehensive programs is established. Metrics for measuring performance allow both internal monitoring of progress as well as the ability to demonstrate compliance levels to business partners...
January 12, 2011 Added by:Danny Lieberman
In the Cloud of rich Web 2.0 application services, we are not in Kansas anymore. There is a very very good reason to be worried. With all the expertise of cloud security providers – the Web 2.0 service they provide is only as secure as the application software itself...
January 10, 2011 Added by:Kevin L. Jackson
The National Institute of Standards and Technology (NIST) has been designated by Federal Chief Information Officer Vivek Kundra to accelerate the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines..
January 06, 2011 Added by:Stefan Fouant
In order for the vision of virtualization to realize it's true potential, the physical mold we have become accustomed to will have to be broken. Resources will need to be pooled together and this just isn't effective or scalable within the confines of traditional server chassis as we know it today...
January 02, 2011 Added by:Kevin L. Jackson
2011 will be the breakout year for GovCloud. Pressure to reduce budget, pressure to manage resources better, and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released...
December 28, 2010 Added by:Sasha Nunke
This new model will ultimately make security easier and more embedded into the architecture of cloud services, while allowing CISOs to select the best cloud providers and SaaS applications to keep their data secure and systems operating more cost effectively and efficiently within regulatory compliance...
How Businesses Can Reduce Wearables Security... manthan rathod on 04-09-2015
Lessons From Hillary Clinton's Email Securit... manthan rathod on 04-09-2015
New Facebook Worm Variant Leverages Multiple... manthan rathod on 04-09-2015