By editor@techworld.com (Accenture) Can the UK lead a digital industrial revolution in Europe? Conventional wisdom often seems to assume not. But the opportunity lies not in creating UK technology giants but in recognizing …read more Source:: Open Source
Month: May 2015
Zero Day Weekly: Wassenaar considered harmful, car hacking, bad news for AdultFriendFinder
by
•A collection of notable security news items for the week ending May 22, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more. …read more Source:: it-priorities
Business As Usual Not An Option For Customer-Obsessed CIOs
by
•By editor@techworld.com (Forrester Analysts) With the threat of Digital Disruption all around us, we all need to up our game. …read more Source:: Open Source
Microsoft open-sources vintage Web services technology
by
•By Paul Krill Microsoft is offering an open source version of its Windows Communication Foundation technology, which has provided a programming model for service-oriented applications. The move’s usefulness remains to be seen, with …read more Source:: OpenSource
Forresters Security & Risk Research Spotlight – The IAM Playbook For 2015
by
•By editor@techworld.com (Forrester Analysts) When I first became research director of Forrester’s S&R team more than five years ago, I was amazed to discover that 30% to 35% of the thousands of client questions …read more Source:: Open Source
The enterprise technologies to watch in 2015
by
•It’s impressive how much the enterprise technology landscape has changed in just a year. While some priorities remain unchanged, important new players have emerged that business and IT leaders must …read more Source:: it-priorities
Industry 4.0: It’s all about information technology this time
by
•The so-called Industry 4.0 concept now being embraced in Europe predicts the Internet of Things will change manufacturing as we know it. …read more Source:: it-priorities
When the collateral damage of cyberwar knocks on your door
by
•By editor@techworld.com (Security spotlight) Cyberwar has been 24/7 for a while already: teams of cyber mercenaries, governmental units, hacktivists, and individuals are breaking into various systems every second. Each cybercriminal has different objectives and …read more Source:: Open Source
Plugging the Virtual Holes Citrix and Terminal Servers Create
by
•By editor@techworld.com (Cryptzone) Citrix and Terminal Servers bring great benefits but they are also an attractive target for hackers. Cryptzone explains how best to protect your corporate data from attacks. …read more Source:: Open Source
Indian IT’s biggest headache
by
•Indian IT needs an urgent solution to its manpower-related productivity problem to secure its future …read more Source:: it-priorities