• July 30, 2014 30 Jul'14

    Indian businesses wake up to IT security risks

    Indian organizations are waking up to the risks that weak security causes as business becomes digitized  Continue Reading

  • July 30, 2014 30 Jul'14

    Government drives autonomous cars onto UK roads

    The UK government has announced plans to allow driverless cars to be used on public roads from early next year  Continue Reading

  • July 30, 2014 30 Jul'14

    Mobile Expense Management

    Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even ...  Continue Reading

  • July 30, 2014 30 Jul'14

    Protecting against modern password cracking

    Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords. Passwords are commonly protected by ...  Continue Reading

  • July 30, 2014 30 Jul'14

    Herding Geese: The Retail Supply Chain

    On September 9th, 2002 Walmart announced that it had selected software from a small company called iSoft to power its new Internet-based EDI system. This was the shot heard round the world in the EDI industry. The new Internet EDI technology, ...  Continue Reading

  • July 30, 2014 30 Jul'14

    Preparing for the Capital Requirements Directive

    The latest round of regulation from the EU to attempt to create a more stable financial system that can better withstand global economic cycles and upheaval was meant to come into force on January 1st, 2013. The Capital Requirements Directive (CRD),...  Continue Reading

  • July 30, 2014 30 Jul'14

    Smart cards: security risks

    Version 3 of the Java Card smart card specification, released in March 2008, overhauled the technical architecture of the smart card. The Connected Edition of the specification introduced a significantly enhanced execution environment and a new ...  Continue Reading

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close