Welcome!


Latest Articles from Web Security Journal
Fujitsu RunMyProcess and MongoDB extend their existing collaboration to deliver seamless integration for cloud solutions to joint customers. More than 350 companies around the world deploy Fujitsu RunMyProcess-based workflow applications that integrate MongoDB. Fujitsu RunMyProcess ...
Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There’s a constant glut of reports, columns and other stories bemoaning the lack of data privacy – and at times, they’re entirely justified. ...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Banks face a difficult tug-of-war every day. Consumers demand innovative new services – regulators demand security, compliance and soundness of all offerings. How can a bank resist being pulled in every direction and find a middle ground? Banks can look to startup technology companies...
Software is increasingly critical to an organization's competitiveness, but the applications being developed consistently meet business stakeholder expectations only 17% of the time. What's the problem...and what's the secret to ensuring that expectations are met?
A recent press report quoted unnamed US intelligence sources saying Russia had no intention of invading the Ukraine. The appraisal became the subject of considerable debate when Russian President Vladimir Putin ordered his nation's military into Ukraine's Crimea region. Follow-on media...
In my last blog, I discussed how today’s Internet is vastly different than the Internet envisioned at the start of the net neutrality debate. As promised, I’d now like to get into some fictional examples that paint the picture of why this is such a polarizing topic for so many. Exampl...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
The cable companies and telcos who dominate the U.S. market for Internet access won a victory when they succeeded in having the heart of the FCC’s ruling on net neutrality struck down. Now, for the first time legally, those companies can both block content and offer fast lane services ...
Cloud migration innovator AppZero has announced a $3M round of funding to support enterprises moving to the cloud, including those faced with moving millions of applications to newer operating systems from Windows Server 2003, which reaches the end of extended support next year. Leadi...
IBM on Wednesday announced it has deployed a business-to-business (B2B) cloud-based network that will help transform the Indian automotive industry by accelerating the movement of data and reducing transaction costs by up to 80 percent. The new exchange – AutoDX – was developed in part...
DocuSign on Tuesday announced the company has raised an additional $85 million with the vast majority from large institutional public funds and the balance from existing investors. DocuSign will use the funds to fuel continued growth as the global standard for Digital Transaction Manag...
Learn how a Process Intelligence Engine identifies business risks and highlights opportunities for process improvement by collecting, correlating and analyzing raw observations throughout the SDLC (source code, defects, build, requirements, ALM, test management…)— helping you mitigate ...
Taking office technology to a new level, Brother is preparing to showcase its latest mobile-focused innovations - and has literally gone beyond the clouds and into space. The office tech specialist's newest technology is designed to meet the demands of today's mobile savvy workforce -...
The new wonder metal, graphene, is being looked at as a building block for communications and electronic devices on the level of what the transistor was sixty years ago. Graphene is a one-atom thick, mesh-like (think hexagonal honeycomb or chicken wire), semi metal that will add more ...
Recording and maintaining good evidence of testing is growing more important all the time. The ability to document what actually happened during the development of hardware or software is vital in many industries. Medical equipment is a great example, as any failure could lead to unexp...
IBM has announced a unique new development environment and capabilities-as-a-service to help clients and developers speed the adoption of "hybrid" clouds, which have the potential to usher in a new era of innovation across the enterprise. As part of its initiative, IBM has invested mor...
As promised in our earlier post, here are the final predictions we saw making the rounds in the blogosphere at the start of the year. Many are predicting that Microsoft will get more serious about the cloud. Amazon dominated the cloud news in 2013, but 2014 will be a good year for Mic...
There's been a lot of discussion on the Internet about the definition of Platform-as-a-Service. Here's just a few very active Twitter discussions to illustrate the level of activity and passion over the topic: This is just a few of the hundreds of tweets returned when I queried "Paas"...
For decades, on-premises installations meant application developers and systems administrators had access to this pre-boot sequence, whether it was for easing asset management, helping to recover from failure, or fine tuning systems for performance. The move to the cloud meant losing a...
PCI DSS is the industry standard for the safe and secure processing of payment card transactions. In order for a business to effectively process card payments, PCI DSS needs to be used and maintained. As more firms head online, the internet offering a great many business opportunities ...
As businesses aspire to move more and more application workloads outside of the boundaries of their private cloud data centers, public cloud service providers are increasingly implementing a private cloud staple: resiliency. In his session at 14th Cloud Expo, John Roese, SVP and Chie...
Pundits, owing to SDN still being very young and not widely adopted, continue to put forth treatise upon treatise as to why organizations should be falling over themselves to go out and get themselves some SDN. Now. Not tomorrow, today. One of the compelling reasons to adopt is to add...
Finansbank in Istanbul has developed an impressive record of managed risk and deployments, with an eye to greater automation over time. Governance, risk management and compliance (GRC) form a top-tier of requirements for banks anywhere in the world as they create and deploy applicatio...
IBM on Monday announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., a privately held database-as-a-service (DBaaS) provider that enables developers to easily and quickly create next generation mobile and web apps. "IBM is leading the charge in helping its clien...
AccelOps on Thursday announced its global survey of 140 IT security professionals found that while cloud usage continues to rise, cloud security remains stagnant. Results indicate that 73 percent of survey respondents are running a greater number of mission-critical applications in the...
“Software-defined,” like any new trend that technology companies rush to attach to has suffered from marketing hype. Starting in mid-2012 with the acquisition of Nicera by VMware, most traditional infrastructure technology vendors across compute, networking, and storage have some messa...
Everyone is putting “DevOps” on their LinkedIn profile, and everyone is trying to hire them. In his session at 2nd DevOps Summit, Jez Humble, a principal at ThoughtWorks, will argue this is not a recruitment problem but an organization’s failure. He will discuss how to grow great peo...
Out-of-band metadata and business context outside hypermedia applications are by definition exterior to the contract, and thus aren’t amenable to any distributed computing architectural style that relies too heavily on static APIs. Therein lies the essential challenge of the API. To th...
Recent high-profile events (2010 Haitian Earthquake, 2011 Tōhoku Earthquake and Tsunami, 2013 Typhoon Haiyan/Yolanda) have highlighted the growing importance played by the international community in successful humanitarian assistance and disaster response. These events also showcased t...
With more organizations embracing cloud mandates and moving quickly to flash-accelerated, shared storage infrastructures, NetApp introduced a new line of enterprise storage systems and enhanced software designed to accelerate the broadest range of virtualized applications. "As they ad...
Hostway Corporation on Thursday announced the appointment of 30-year technology industry veteran Robert Boles to the post of Chief Executive Officer. He succeeds John Martis, who is the new Chief Operating Officer and will work with Boles to broaden the company’s Infrastructure-as-a-Se...
#SDN #Devops #LineRate When you put software into the data path there are some things it better have to make sure it doesn't become a liability The software-everywhere drumbeat continues to resound across the entire industry. Experts assure us that software can perform as well as har...
Innodisk has announced a full-rate production of a nanoSSD SATA device that conforms to JEDEC’s standard (MO-276). Innodisk integrates a flash control chip, NAND flash, and ball grid array (BGA) package to deliver a nanoSSD that is approximately 1% of the size (16mm x 20mm x2mm) of a ...
The initial wave of data efficiency features for primary storage focus on silos of information organized in terms of individual file systems. Deduplication and compression features provided by some vendors are limited by the scalability of those underlying file systems, essentially the...
October 1, 2013, was the most anticipated date for the Obama administration since his re-election. It was to be the day every American would have access to health care on one centralized website. However, according to at least one report only six people enrolled in Obamacare on the fir...
IDenticard® Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of...
What have you done online today – checked LinkedIn? Facebook? Twitter? Opened and sent business emails? Used business apps? Every business employee also has a private life – and it’s becoming increasingly difficult to keep the two separate. Rather than ignoring the growing role of soci...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...