GAGEtrak, the world's leading calibration management software solution helps you manage metrology assets, forecast workloads, minimize...
Showing results 1 to 20 of 332
The major software companies are rebelling against the established standards for revocation checking. Some new standards and some vendor hacks are replacing our current, broken system.
A group of 27 organisations - including the Free Software Foundation and the Electronic Frontier Foundation - have written to the web standards body W3C urging it to reject proposals that would make it easier to support DRM-protected media in HTML5-based sites.
The software giant joins the coalition of more than 300 members in a bid to promote common standards and interoperability among cloud service providers and data center purchasing.
Though Cisco's earnings were better than expected, the company is likely to have a difficult time embracing software-defined networking, as its hardware commitment restricts its technology development options.
Security and privacy concerns over patient data legitimate, but industry needs to adopt balanced view by defining importance of information and avoid being overly "paranoid", execs state.
Patience card game solitaire is a popular card game. This free game makes it simple and easy to play it for hours. GOAL of Patience...
Businesses need to decide if they want to devote resources to secure own infrastructure when cloud providers can offer more robust environment since their core business requires it.
Web sites, using names of government organizations or charity groups, conned money from businesses or individuals through blackmail, identity thefts and ransoms.
FontDoctor has long been the industry standard software tool for font problem diagnosis, repair, organization, and now font archiving...
Cloud-based distributed denial of service protection a lucrative business opportunity, especially in Asia where awareness of DDoS attacks and risks is growing, industry exec says.
Complexity arises as merchants with little knowledge of security enter market and vendors not focus on safeguarding technology, thus making standards for mobile payments a necessity, PCI exec notes.
Study shows two camps of small and midsize businesses citing costs and security as both benefits and barriers to cloud adoption, leading one Redmond exec to urge vendors to do more to close this "perception gap".
Issues such as network latency, immature legal frameworks and inadequate safeguards for customers to disengage from cloud services mean most will retain critical apps in-house, observers note.
Observers believe H.264 will remain global standard for video surveillance due to wider, global industry acceptance, despite uptake of China's Surveillance Video and Audio Coding (SVAC) standard.
Country found as top source of attack traffic in fourth quarter of 2011, up from third place in previous quarter, while United States came in second, according to report.
Companies need to change mindset of protecting physical endpoints, to access to corporate information as data is today's "cyber currency" and subject to increased attacks, Trend Micro CEO states.
Thursby Software, a longtime developer in the Apple enterprise and government markets, on Wednesday will announce PKard for iOS, a solution that provides a secure browser supporting a variety of card standards including CAC, PIV and PIV-Interoperable certifications.
The Identity in the Cloud technical committee at OASIS is calling on the public to help it vet identity standards for a myriad of cloud use cases from mobile to digital signatures.
Bring-your-own device gives employees freedom to choose hardware and software they want to perform work tasks, boosting efficiency as well as staff happiness, survey finds.
Growing enterprise adoption of open source software spotlights need to ensure licensing compliance and mitigate risks, which scanning tools can help manage, say market players.
Varying deployment options and licensing models complicate how companies manage software, hence invest more time and money on software asset management, analysts urge.
Model provides platform for cybercriminals to come together to share knowledge and develop new, advanced malware, more quickly and at lower costs, insiders warn.