Travelers arriving at U.S. borders may soon be confronted with their laptops, PDAs, and other digital devices being searched, copied and even held by customs agents — all without need to show suspicion for cause. Notices are being proposed by the Privacy Office at the U.S. Department of Homeland Security (DHS), which last week released […]
Posted on March 22nd, 2010 by admin
Filed under: Uncategorized | 256 Comments »
SOA Design Patterns & Best Practices Some of the most important tools in the evaluation, purchase, and ongoing use of Service-Oriented Architecture (SOA) are the best practices that vendors, consultants, and customers have compiled. What factors vary most are the time, cost, and ease of SOA implementation. This template gives you the tools for SOA […]
Posted on March 21st, 2010 by admin
Filed under: Uncategorized | 249 Comments »
Recovery point objective (RPO) refers to the amount of data loss a customer can tolerate, specifically the point in time to which your enterprise must be able to recover the data. Some enterprises require an RPO of ZERO. That means the enterprise cannot lose a single committed transaction in the event of a site failure; they must […]
Posted on March 21st, 2010 by admin
Filed under: Uncategorized | 264 Comments »
This year’s MIX 2010 was led by Scott Guthrie, who has emerged from Microsoft’s rank and file to own just about everything developer-related. Where last year’s MIX and PDC conferences were spearheaded by Chief Software Architect Ray Ozzie, Guthrie’s keynote appearances focused on the progress Silverlight has made in driving the company’s 3 Screens and […]
Posted on March 19th, 2010 by admin
Filed under: Uncategorized | 244 Comments »
Logica, the technology and business services company, is looking to partner with the world’s most innovative Small and Medium Enterprises. It today kicked off its 2010 Global Innovation Venture Partner (GIVP) Programme to search for the company with the most innovative products and solutions. Now in its third year, the GIVP Programme invites nominations from […]
Posted on March 18th, 2010 by admin
Filed under: Uncategorized | 249 Comments »
Microsoft’s stealth Windows replacement WebOS turned the corner today with the announcement of Windows Phone developer tools. Mention Silverlight on the Gillmor Gang as I did Friday, and Google evangelists Chris Messina and Brett Slatkin did a living Blue Screen of Death. But Nexus One and Android success not only validates the race with Apple, […]
Posted on March 18th, 2010 by admin
Filed under: Uncategorized | 231 Comments »
There’s no question that Google is setting its sights on taking some of Microsoft’s marketshare in the productivity suite space. Last year, Google announced a new plug-in that syncs Google’s enterprise versions of Apps, including Gmail, contacts, and calendar, with Microsoft’s Outlook. And Google just acquired Docverse, an application lets users collaborate directly on Microsoft […]
Posted on March 18th, 2010 by admin
Filed under: Uncategorized | 228 Comments »
Under the radar startup NorthScale is publicly launching today with a new data management technology to help web-based companies, particularly startups that deal with large amounts of transactional data. For example, social gaming giant Zynga has been using NorthScale since December. Founded by leaders of the memcached open source project, NorthScale is like Cloudera for […]
Posted on March 17th, 2010 by admin
Filed under: Uncategorized | 229 Comments »
This is the next blog in the continuing series of interviews with top-echelon and renowned professionals. In this blog, I interview Dr. Lecia Barker: Senior Research Scientist for the National Center for Women & IT, Leading Educator, and Top Thought Leader. Lecia shares her insights into unconscious bias, attracting diversity into computing, maximizing educational environments […]
Posted on March 17th, 2010 by admin
Filed under: Uncategorized | 239 Comments »
CSC will provide judges and support staff for teams competing in the 5th Mid-Atlantic Collegiate Cyber Defense Competition (CCDC), March 11-13, 2010. Pitting college students against hackers trying to disrupt and compromise their networks, the competition is unique in its focus on the operational aspects of managing and protecting an existing network infrastructure. Student teams […]
Posted on March 17th, 2010 by admin
Filed under: Uncategorized | 260 Comments »