- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
Enterprise search software provider LucidWorks has introduced a package based on its open-source Apache Solr search engine that will allow administrators and business analysts to extract more information from IT system logs.
By Joab Jackson | 02 April, 2014 22:02
SugarCRM customers will soon be able to import business contact data from Dun & Bradstreet, giving them a new means for finding and closing deals more efficiently.
By Chris Kanaracus | 26 March, 2014 15:00
Oracle is moving into the market for big customer data by buying BlueKai, which aggregates data on consumers and offers it to marketers via a platform for running targeted marketing campaigns on the Web, offline and on mobile devices. Terms of the deal, which was announced Monday, were not disclosed.
By Chris Kanaracus | 24 February, 2014 14:26
Intel is continuing to build out its array of software tools for the Hadoop open-source big data processing framework, with an emphasis on the security and reliability features demanded by large enterprises.
By Chris Kanaracus | 13 February, 2014 17:17
Oracle's string of high-profile cloud-computing partnership announcements with Microsoft, Salesforce.com and NetSuite dominated tech news headlines this week.
By Chris Kanaracus | 28 June, 2013 20:25
Whitepapers about Data management
Enterprise mobile apps represent an opportunity to enhance user productivity. IT has to secure and manage the data flowing through these apps but shouldn't compromise the user experience. Read this tip sheet to learn what’s needed in a mobile app security solution that will transform the enterprise.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence ConsultantNSW
- FTExecutive Producer/Head of Production: Advertising AgencyNSW
- FTIT Support EngineerNSW
- FTOBIEE BI/DW ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
- Court slaps TPG with $400k fine over 000 failure
- Lycamobile issued warning for over-charging customers
- TPG should pay rural levy for each FTTB service: NBN Co
- Ukraine tensions could hurt international security efforts, Kaspersky says
- See ya, Microsoft: Intel looks to Android for growth in tablets
- Rushed Heartbleed fixes may expose users to new attacks
- NBN Co hits 105Mbps in limited FTTN trial
- Typo halts sales of iPhone keyboard as injunction takes effect
- In Pictures: Windows 8.1 tablets with 8-inch screens: Which one is right for you?
- Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
- Big data drives 47% growth for top 50 public cloud companies
- Cellular industry makes concession on kill switch
- In Pictures: Inside evolving satellite technology
- Intel sells more tablet chips but profits fall
- Red Hat adds muscle to Docker container technology