PRINT & WEB DESIGN
Start Live Help Chat
ComputerWeekly: Latest IT News
Royal Free Hospital digitises legacy patient medical records
(Mon, 28 Jul 2014 10:45:14 EDT)
Royal Free teaching hospital in London has digitised 750,000 legacy case notes which contain patient medical records
Pass the hash? Severity of Active Directory security flaw questioned
(Mon, 28 Jul 2014 10:01:38 EDT)
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
Microsoft de-emphasizes Windows, lays out mobile device plans
(Mon, 28 Jul 2014 09:45:04 EDT)
Microsoft customers awaiting Windows 9 updates didn't hear details at WPC, where the company touted cross-platform support and mobile device plans.
Why 'logical data warehouse' is no longer a logical term
(Mon, 28 Jul 2014 09:22:19 EDT)
Concerns about cloud governance and data sovereignty are stumbling blocks for many enterprises with an international customer base.
Amazon elusive on cloud data sovereignty
(Mon, 28 Jul 2014 09:11:24 EDT)
Amazon may be the king of the cloud world, but some customers find its data sovereignty assurances clear as mud.
India’s dedicated Cryptology centre gets Rs. 115 crore funding
(Mon, 28 Jul 2014 08:09:05 EDT)
Work on India’s first dedicated cryptology centre will likely now accelerate as the project has gained initial funding of Rs. 115 crore
Oracle in-memory option creates licensing pain and audit risk
(Mon, 28 Jul 2014 07:32:22 EDT)
A former Oracle employee has highlighted a major issue in the way the new Oracle Database 12c Release 184.108.40.206 is licensed
5G network for London by 2020, says Boris Johnson
(Mon, 28 Jul 2014 06:40:29 EDT)
Mayor Boris Johnson to promise 5G mobile network for London by the end of the decade
Security Think Tank: How to build a resilient defence against cyber attacks
(Mon, 28 Jul 2014 05:59:16 EDT)
How to build a resilient case against cyber attacks
Belt and braces: covering all the endpoint security angles
(Mon, 28 Jul 2014 05:38:32 EDT)
Given users have skipped beyond the safe confines of wholly owned and heavily guarded corporate networks, how do you keep data safe?
©copyright 2010 - 2014 | all rights reserved. | Cleverfish 2000 Ash St. Scranton, PA 18510