Month: July 2012

Persistent Threat Management

– Lori MacVittie, senior technical marketing manager at F5 Networks (www.f5.com), says:Examples of devops focuses a lot on provisioning and deployment configuration. Rarely mentioned is security, even though there is...

Read More

Selecting a UPS With High Availability

– Jeff Stieman, spokesperson for TrippLite (www.tripplite.com), says:Are you responsible for distributed networks, branch offices, retail store locations, IDF network closets, or a small datacenter?  If so, then you are...

Read More

Persistent Threat Management

– Lori MacVittie, senior technical marketing manager at F5 Networks (www.f5.com), says: Examples of devops focuses a lot on provisioning and deployment configuration. Rarely mentioned is security, even though there is...

Read More

The Hidden Value of Rapidly Expanding Data

– Jack Norris, vice president, marketing, MapR Technologies (www.mapr.com), says:With the Internet now touching more than two billion people daily, every call, tweet, e-mail, download, or purchase generates valuable data....

Read More

Application Security is a Stack

– Lori MacVittie, senior technical marketing manager at F5 Networks (www.f5.com), says: This little historical tidbit illustrates perfectly the issue with language, and how it can confuse two different groups of people who...

Read More
  • 1
  • 2

Archives