Quantcast
Channel: Tek-Tips Whitepaper Library » Security
Browsing latest articles
Browse All 62 View Live

Image may be NSFW.
Clik here to view.

Under the Hood: Cloud and Data Center Orchestration and Management – Part 2

This is a continuation from Part 1. Computing environment specification with GUI Quali’s GUI is an entry point to Quali’s ClodShell orchestration platform, which is a powerful tool for specifying a...

View Article



Image may be NSFW.
Clik here to view.

IoT and Communications Standards

The Internet of Things (IoT) is getting a lot of attention these days. From the standards point of view, there are several aspects. One is networking and communications. There was a timely meetup by...

View Article

Image may be NSFW.
Clik here to view.

IoT Standards and Standards Organizations – Part 1

There are several standards and standards organizations for the Internet of Things (IoT), and I’ve discussed some of them in past blogs (here and here). Quite frankly, there are too many to understand...

View Article

Image may be NSFW.
Clik here to view.

IoT Standards and Standards Organizations – Part 2

This is a continuation of IoT Standards and Standards Organizations – Part 1. Network Transports Standards Organizations Wi-Fi Alliance “Wi-Fi Alliance® is the worldwide network of companies that...

View Article

Image may be NSFW.
Clik here to view.

IoT Standards and Standards Organizations – Part 3

This is a continuation of IoT Standards and Standards Organizations – Part 2. Stakeholders’ view of standards Guy also talked about stakeholders’ view of the standards, that of consumers, developers,...

View Article


Insider Data Breaches: Invisible Threats to Your Business

The threat of insider data breach is not new for the online business world. In 2005, a former AOL software engineer stole 92 million screen names and e-mail addresses. This past January, major...

View Article

Image may be NSFW.
Clik here to view.

Is Artificial Intelligence Going to Make It This Time?

In the past, AI was talked about for its potential in the computing market, but it was deemed not usable or applicable for a long time. Now AI is being seen in a new light. Some people, like Stephen...

View Article

Image may be NSFW.
Clik here to view.

Good Survey of Network Security Software @MacITConf – Part 1

I wish I could handle MAC, but I’ve been a PC guy since abandoning Unix (not Linux) in 1995. Because MAC OS X is based on Unix, I would like to move my computing platform there some day. That won’t be...

View Article


Image may be NSFW.
Clik here to view.

Good Survey Session of Network Security Software @MacITConf – Part 2

This is a continuation from Part 1.   Network utilities ŸBasic security module (BSM):a security audit API and file format originally developed by Sun. ŸOpenBSM: portable, open source implementation of...

View Article


Image may be NSFW.
Clik here to view.

Real-Time Streaming Data Analysis with SaaS

In a recent Technology Convergence Conference, Dean Nelson, Vice President, Global Foundation Services (GFS), eBay, said something like the following. People embrace cloud computing, the digital world,...

View Article
Browsing latest articles
Browse All 62 View Live




Latest Images