System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Monitoring
05 Jul 2015 Businesses Struggle To Counter Insider Threats [44025]
eWeek, June 26th, 2015

"Application users are most likely to cause a security breach because of negligence, as monitoring is mainly done by ad hoc or manual systems", reports Nathan Eddy in eWeek.

"While companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity, the proliferation of applications is creating a serious security threat, according to a survey of 610 U.S. IT and IT security practitioners, sponsored by ObserveIT and conducted by the Ponemon Institute..."
(Get More Information . .) open to premium members only

05 Jul 2015 Top Ten Articles for last few Issues [43808]
Vol 208 Issues 1, 2, 3 and 4 ; Vol 207 Issues 1, 2, 3 and 4

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • 'Big Data' Has Lost Its Zing - Businesses Want Insight And Action
  • Cover Letters Are Dead -- Send A Pain Letter, Instead
  • The Rise Of SSDs Over Hard Drives, Debunked
  • 10 IoT Applications for SMEs
  • Breakthrough May Double Speed Of Fiber Optics Networks
  • Microscale 'Transformer' Robots Are Joining Forces To Break Through Blocked Arteries
  • Google Made A Chatbot That Debates The Meaning Of Life
  • Bitcoin ATMs 101: What You Need To Know About This Growing Business Opportunity
  • The Dirty Secrets Of Project Management Revealed
  • How To Keep Track Of Sensitive Data With A Data Flow Map

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

28 Jun 2015 7 command line tools for monitoring your Linux system [43654]
Network World, June 18th, 2015

Mark Gibbs writes in Network World, "One of the great things about Linux is how deeply you can dive into the system to explore how it works and to look for opportunities to fine tune performance or diagnose problems. Here is a selection of basic command line tools that will make your exploration and optimization easier..."
(Get More Information . .) open to premium members only

28 Jun 2015 Top Ten Articles for last few Issues [43614]
Vol 208 Issues 1, 2 and 3 ; Vol 207 Issues 1, 2 and 3; Vol 206 Issues 4 and 5

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • 7 Tips To Get Recruiters To Look At Your Linkedin Profile
  • 4 IoT Skills IT Pros Need
  • How Artificial Intelligence Explains Analytics
  • 7 command line tools for monitoring your Linux system
  • 5 Reasons Open Source Software Is Good For Your Business
  • IT Funding Potholes
  • Why Are There Still So Many Website Vulnerabilities?
  • Adding Flash To Your Virtualized Data Center
  • False Flags, Red Herrings And Wild Goose Chases: Why Unmasking Hackers Is Harder Than Ever
  • PPM (Project And Portfolio Management)

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

26 Jun 2015 Businesses Struggle To Counter Insider Threats [43703]
eWeek, June 26th, 2015

"Application users are most likely to cause a security breach because of negligence, as monitoring is mainly done by ad hoc or manual systems.

While companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity, the proliferation of applications is creating a serious security threat, according to a survey of 610 U.S. IT and IT security practitioners, sponsored by ObserveIT and conducted by the Ponemon Institute..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998

!-- end archive_section.tpl -->