article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI.

Security 104
article thumbnail

Our book “Software Architecture Metrics: Case Studies to Improve the Quality of Your Architecture” is published!

Apiumhub

Neal Ford – Author of the book “Building Evolutionary Architectures: Support Constant Change” Neal Ford is director, software architect, and meme wrangler at Thoughtworks, a global IT consultancy with an exclusive focus on end-to-end software development and delivery. Rene Weiss is a CTO at Finabro.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DARPA Official: Human-Robot Teams Key to Disaster Response

CTOvision

DARPA tried again in March 2011 in the deadly aftermath of a magnitude 9.0 The technology will be ready for commercialization if a market can be found in the commercial world for it,” Pratt said. What many people don’t realize is that the defense market is a very small fraction of the size of the commercial market.”.

article thumbnail

Summary from the 30 July Analyst Forum

CTOvision

Among the many considerations he helped us think through were the fact that we all need to recognize that you cant just build higher walls for Internet security. Next Wall addressed the London riots of 2011, relative to geospatial technology. This panel addressed the challenges with data in national security.

article thumbnail

Top Ten Web Hacking Techniques of 2010 (Official)

Jeremiah Grossman

Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Since inception of the Top Ten Web Hacking Techniques list, the diversity, volume, and innovation of security research has always been impressive.

article thumbnail

22 Health IT Experts Reveal the Single Best Way to Simplify Interoperability in Healthcare IT

Datica

While the benefits are clear, obstacles such as ensuring the security of personal health information (PHI) and integration challenges mean it’s not possible to simply share data freely across the industry. Vendors should be technology-agnostic, have open APIs, and enable easy third-party integration. propelzach. Amit Bareket.