Does Apple Need Ten Years of Trustworthy Computing?
Researchers at Kapersky Lab recently concluded that Apple is an entire decade behin
CISPA Passes in the House, 3D Modelling of DoD Networks, and More
Today’s federal cybersecurity and information technology news round-up:
Refuse to be a Cloud data hostage.
You should never be locked into one vendor, and should ALWAYS be able to walk away from a service provider…
Behind AmazonSupply, a Nuts-and-Bolts Service Oriented Architecture
As reported by ZDNet colleague Zack Whittaker, Amazon is expanding its retail store offerings to business and industrial clients with…
Location Intelligence and Mobile BI: Advancing Customer Relations in the Finance and Banking Sector
A recent Bank Systems and Technology report says that many U.S. banks and other financial institutions could benefit from implementing…
Why a Chargeback Model for Private Cloud May Be Problematic
While the economics of public cloud may be fairly clear for many organizations, public cloud is a murky area.
Cybersecurity Gaps Across Government, New Monitoring Tool, and More
This month, the Department of Energy, in working with the
Is Cloud Computing Hurtling Towards Disaster?
The freight train of cloud computing has left the station and is on an exponential growth tear. But just like…
Location Intelligence and Mobile BI: Advancing the ‘where’ in mining and exploration
You work for Big Mining Co in the mining and exploration industry. Mineral exploration requires and utilizes a diverse range…