Searched for: "defense enabled applications"
- Security (43)
- Networking (30)
- Microsoft (19)
- Cxo (14)
- Data Centers (12)
- Mobility (11)
- Enterprise Software (10)
- Software (10)
- Developer (7)
- Hardware (6)
- Open Source (5)
- Collaboration (4)
- Data Management (3)
- Apple (2)
- Cloud (2)
- Storage (2)
- Android (1)
- Project Management (1)
- Tech & Work (1)
- Tech Industry (1)
- Virtualization (1)
About 185 results for "defense enabled applications"
Networking experts create an experimental system to offer better security in the promiscuous world of the cloud.
Using multiple service providers to improve redundancy works only if the providers are not sharing fiber optic conduit space. Researchers suggest caution, as infrastructure sharing...
The omnichannel concept represents a new way of thinking about IT applications. Here's an omnichannel primer for IT leaders.
Conflicted much, Apple? Safari, iAd, and how Apple's expanding mission are driving conflicting priorities
Apple wants to do what's right for customers, but an expanding vision is leading to conflicts. Matt Asay explains.
As sensor tech and IoT grows, firms need to enhance their capacity to collect data and derive business-critical information via analytics. Find out how in our Q&A with Savi SVP And...
C.J. Radford predicts the usage of cloud applications will accelerate in 2015, says data-at-rest protection is imperative for enterprise cloud deployment, and more in this Q&A.
A consortium led by Mozilla, Akamai, Cisco, and the Electronic Frontier Foundation will open a certificate authority in 2015 to offer free encryption certificates to increase encry...
18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream.
Lollipop is almost here, and it should be the most secure Android experience to date. But does this mean security is completely out of the hands of the users? Jack Wallen takes on ...
Jesus Vigo explains how to enable two-step verification for your Apple ID and protect your sensitive data in iCloud.