Close

Search Results for: integration

Cyber Tech 2015 – It’s a Wrap

It has been a crazy two days at Israel?s Cyber Tech 2015?in a good way! The exhibition hall was split into three sections: the booths of the established companies, the

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand

Counter Attacks – Random Thoughts

The surging amount of cyber attacks against companies and their dear consequences pushes companies to the edge. Defensive measures can go only so far in terms of effectiveness, assuming they

Easily develop cool UI in native client applications

For a long time, I was contemplating on the best strategy for client application development, mobile clients, or desktop client applications. The problem with native client application development is usually

Software As a Service – Perspectives

My perspectives on the important subject of software as a service presented on Venture Chronicles by Jeff Nolan: Software as a Service – Part 1. Evolving Relationships – Technology is

didn't find what you are looking for?

Search again