Cybersecurity: It’s More Than Worms, Hacking and Phishing
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex enough, now we’re not just policing for cyber criminal activity,…
Transforming IT One Blog Entry At A Time
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex enough, now we’re not just policing for cyber criminal activity,…
In October of 2009 I was interviewed by GovIT Journal and in that article I presented my view that Cloud Computing is highly dependent upon the network. The actual quote…
Thanks to @jadkins for the colorful ending to that cliched saying, which really got me thinking. Sometimes we just make certain aspects of architecture too difficult for no reason. Good…
Additionally, proper inclusion of metering and instrumentation interfaces into you Cloud service means that you have greater control over the granularity of the data produced through these interfaces. Most metering…
There’s a lot of points that will be made in this blog entry. To keep them straight, I will highlight them right up front: Vendors are getting behind SCA because…
As part of my job, I help customers to select the appropriate software to either fulfill a need or as a component of a larger solution. Fulfilling this role means…
It’s taken more than 10 years, but I finally got it through my thick skull: A design is only as good as the potential for it to be put it…