Searched for: "defense enabled applications"
- Security (43)
- Networking (30)
- Microsoft (19)
- Cxo (14)
- Data Centers (12)
- Enterprise Software (10)
- Mobility (10)
- Software (10)
- Developer (7)
- Hardware (6)
- Open Source (5)
- Collaboration (4)
- Data Management (3)
- Apple (2)
- Cloud (2)
- Storage (2)
- Android (1)
- Project Management (1)
- Tech & Work (1)
- Tech Industry (1)
- Virtualization (1)
About 184 results for "defense enabled applications"
Networking experts create an experimental system to offer better security in the promiscuous world of the cloud.
Using multiple service providers to improve redundancy works only if the providers are not sharing fiber optic conduit space. Researchers suggest caution, as infrastructure sharing is common.
The omnichannel concept represents a new way of thinking about IT applications. Here's an omnichannel primer for IT leaders.
Conflicted much, Apple? Safari, iAd, and how Apple's expanding mission are driving conflicting priorities
Apple wants to do what's right for customers, but an expanding vision is leading to conflicts. Matt Asay explains.
Wireless Sensor Network (WSN) is implemented across wide area of applications, including agriculture, defense and so on. A sensor network is a wireless network of the sensors deplo...
As sensor tech and IoT grows, firms need to enhance their capacity to collect data and derive business-critical information via analytics. Find out how in our Q&A with Savi SVP Andy Souders.
C.J. Radford predicts the usage of cloud applications will accelerate in 2015, says data-at-rest protection is imperative for enterprise cloud deployment, and more in this Q&A.
A consortium led by Mozilla, Akamai, Cisco, and the Electronic Frontier Foundation will open a certificate authority in 2015 to offer free encryption certificates to increase encrypted online traffic.
18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream.
Lollipop is almost here, and it should be the most secure Android experience to date. But does this mean security is completely out of the hands of the users? Jack Wallen takes on this question.