Thursday May 9, 2024

Big Brother gets bigger and bolder – Security at Risk

Travelers arriving at U.S. borders may soon be confronted with their laptops, PDAs, and other digital devices being searched, copied and even held by customs agents — all without need to show suspicion for cause. Notices are being proposed by the Privacy Office at the U.S. Department of Homeland Security (DHS), which last week released […]

SOA Best Practicdes

SOA Design Patterns & Best Practices Some of the most important tools in the evaluation, purchase, and ongoing use of Service-Oriented Architecture (SOA) are the best practices that vendors, consultants, and customers have compiled. What factors vary most are the time, cost, and ease of SOA implementation. This template gives you the tools for SOA […]

Recovery Point and Recovery Time Metrics

Recovery point objective (RPO) refers to the amount of data loss a customer can tolerate, specifically the point in time to which your enterprise must be able to recover the data. Some enterprises require an RPO of ZERO. That means the enterprise cannot lose a single committed transaction in the event of a site failure; they must […]

Microsoft’s Scott Guthrie on Silverlight and Windows Phone

This year’s MIX 2010 was led by Scott Guthrie, who has emerged from Microsoft’s rank and file to own just about everything developer-related. Where last year’s MIX and PDC conferences were spearheaded by Chief Software Architect Ray Ozzie, Guthrie’s keynote appearances focused on the progress Silverlight has made in driving the company’s 3 Screens and […]

Logica launches competition to find innovative partners

Logica, the technology and business services company, is looking to partner with the world’s most innovative Small and Medium Enterprises. It today kicked off its 2010 Global Innovation Venture Partner (GIVP) Programme to search for the company with the most innovative products and solutions. Now in its third year, the GIVP Programme invites nominations from […]

Silverlight goes where the money is: mobile

Microsoft’s stealth Windows replacement WebOS turned the corner today with the announcement of Windows Phone developer tools. Mention Silverlight on the Gillmor Gang as I did Friday, and Google evangelists Chris Messina and Brett Slatkin did a living Blue Screen of Death. But Nexus One and Android success not only validates the race with Apple, […]

Google Makes Exchanging Microsoft Exchange For Google Apps A Bit Easier

There’s no question that Google is setting its sights on taking some of Microsoft’s marketshare in the productivity suite space. Last year, Google announced a new plug-in that syncs Google’s enterprise versions of Apps, including Gmail, contacts, and calendar, with Microsoft’s Outlook. And Google just acquired Docverse, an application lets users collaborate directly on Microsoft […]

NorthScale’s Memecached Data Management Technology Attracts Zynga And Others

Under the radar startup NorthScale is publicly launching today with a new data management technology to help web-based companies, particularly startups that deal with large amounts of transactional data. For example, social gaming giant Zynga has been using NorthScale since December. Founded by leaders of the memcached open source project, NorthScale is like Cloudera for […]

Dr. Lecia Barker: Senior Research Scientist for the National Center for Women & IT shares her insights into unconscious bias, attracting diversity into computing, maximizing educational environments and technologies

This is the next blog in the continuing series of interviews with top-echelon and renowned professionals. In this blog, I interview Dr. Lecia Barker: Senior Research Scientist for the National Center for Women & IT, Leading Educator, and Top Thought Leader. Lecia shares her insights into unconscious bias, attracting diversity into computing, maximizing educational environments […]

CSC employees help mentor next generation cyber experts at fifth Mid-Atlantic Collegiate Cyber Defense Competition

CSC will provide judges and support staff for teams competing in the 5th Mid-Atlantic Collegiate Cyber Defense Competition (CCDC), March 11-13, 2010. Pitting college students against hackers trying to disrupt and compromise their networks, the competition is unique in its focus on the operational aspects of managing and protecting an existing network infrastructure. Student teams […]