eweek.com

Five Ways a CFO Can Invest in Securing Their Organization

Considering the costs related to security, it's no wonder that the CFO might struggle a bit in regards to investing in this part of the business.

More >
eweek.com

BlackBerry: Your PBX May Be Your Biggest Security Exposure

Until you know that you are on a secure encrypted line, figure that someone will eventually listen to whatever you are saying.

More >
eweek.com

SAP Partners with Apigee to Expose RESTful APIs

SAP is now making a concerted effort to make its entire portfolio of applications more accessible.

More >
eweek.com

The Two Sides of 3D Printing

Each advancement in 3D printing has the potential to hinder society as well as help it.

More >
eweek.com

SolarWinds Adds Deep Packet Inspection to Network Monitoring Tool

Version 11.0 of SolarWinds NPM uses deep packet inspection to identify how app response times are impacted by a networking issue.

More >
eweek.com

Some Organizations Still Struggle with Data Basics

Automating data integration can pay real business dividends.

More >

IT Downloads

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

DataM14 Large Scale and Big Data: Processing and Management

In this excerpt from chapter 9, readers are provided on overview of the NoSQL world, exploring the recent advancements and the new approaches of Web-scale data management.

Learn more >

Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

Learn more >

Job Description: Senior Software Engineer/Big Data

The ideal candidate will have previous Big Data experience using Hadoop/Storm and machine learning to solve large-scale problems. .

Learn more >

cloud20 Protection Options for Virtualized Infrastructures in IaaS Cloud

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.