Value stream management involves people in the organization to examine workflows and other processes to ensure they are deriving the maximum value from their efforts while eliminating waste — of ...
Everyone seems to think that the Cloud and Big Data is going to be bigger than ever in 2016. All of us "data civilians" (a new term I just ran across) will only need a terminal and a mobile phone, ...
It's no secret that cyber threats are everywhere and growing stronger all the time. Any credible cybersecurity effort relies on active threat intelligence to examine vulnerabilities and bolster ...
COMMENTARY--I can imagine a world where the computers needed no security. Where there were no passwords, no security checks, and no firewalls. Where the computers communicated freely and shared ...
Heavily regulated enterprise organizations today are required to prioritize security and compliance within their IT environment, and need flexibility to filter private information out of their logs ...
Direct Computer Resources, Inc., a provider of data privacy, file management and application development testing software, has been granted a patent in connection with the data obfuscation technology ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
People spend a lot of time concerned about getting their information off the internet and out of the hands of organizations that collect it, but the concept of obfuscation – injecting false, ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Thieves making off with laptops, hackers planting a Trojan ...