By Bob Gourley If you are an analyst or executive or architect engaged in the analysis of big data, this is a “must attend” event. We will be there engaging with the community and hope to see you there. Registration is now open for the third annual Federal Big Data Apache Hadoop Forum! Register ...
Posts Tagged: Infrastructure
By Bob Gourley If you are an analyst or executive or architect engaged in the analysis of big data, this is a “must attend” event. We will be there engaging with the community and hope to see you there. Registration is now open for the third annual Federal Big Data Apache Hadoop Forum! Register ...
By Bob Gourley webMethods 9.5 enables elastic scaling, mobile and social BPM SAN FRANCISCO, Oct. 10, 2013 – Software AG today announced the launch of the next version of the market leading webMethods 9.5 platform at its annual Innovation World user’s conference in San Francisco. The focu...
By Ryan Kamauff Here are the top cyber news and stories of the day. New Virus Hits Freezing Point – “There is a new virus that protects itself against antiviruses by freezing the hard disk, researchers said. Once it infects a device, the virus creates a restore point. All the modifications made ...
By Ryan Kamauff Here are the top cyber news and stories of the day. Is DHS’ acquisitions program becoming unaffordable? The DHS is under a lot of intense scrutiny lately to re-vamp their acquisition processes in the face of allegations and revelations of inefficiencies and waste. One specific exam...
By Richard Stiennon I have just published a children’s book on SCADA. How crazy is that? Supervisory Control and Data Acquisition(SCADA) refers to the technologies and protocols used in most manufacturing, oil and gas, electrical grid, and transportation for communicating with physical components ...
By Bob Gourley This year’s FedCyber summit will be held 6 Nov at the Crystal Gateway Marriott in Arlington VA. Every year we bring together a small group of professionals to exchange best practices, discuss the latest threats and to contribute ideas that can help improve the state of cybersecurity...
By Ryan Kamauff Here are the top cyber news and stories of the day. Programmer exploits Windows vulnerability in cloud-based services – “Windows data volumes (meaning virtual machine hard-drives) in public clouds such as Amazon Web Services can be copied and have their access credentials mo...