August 18, 2014 | InCITE | Your twice weekly digest of the most important developments in the consumerization of IT | APIs are a cornerstone of the modern cloud economy. But are we putting too much faith in the people who make these platforms? | White Paper: IBM Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security. Learn more! | Companies won't have to ask -- they'll just know. | White Paper: IBM Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security. Learn More | When things go wrong, do you want to find out who's to blame, or concentrate on fixing the problem and re-engineering the system so it doesn't happen again? | Your browser's debugging tools are there to make sure your web apps don't blow up in your users' faces. | We're in a dark age for computer security, but the rise of mobile and wearable devices with built-in biometrics could save us. | Neura, a startup that has been accepted into Microsoft Ventures' accelerator program, has a novel approach to connecting devices. | Humin has some cool features, but If you want a place in my life, you must sync with all my cloud sources. | As Chromebooks continue to become widely used in U.S. public school systems, the laptops powered by Google's Chrome OS may be a viable alternative for cost-conscious college students. | | | |
|
No comments:
Post a Comment