Remove 2004 Remove Applications Remove Licensing Remove Security
article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO Business Intelligence

Rather than selling software to customers, HP said, Autonomy had been selling them hardware at a loss, then booking the sales as software licensing revenue. March 2004: Autonomy acquires NativeMinds and Cardiff Software. This is hardly a surprise as the SFO has a reputation for failing to secure convictions. 19, 2011, and Nov.

HP 105
article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The application is expected for general release in February.

Trends 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social networks, intelligence, and homeland security - Trends in the Living Networks

Trends in the Living Networks

Netmap is used extensively by intelligence and law enforcement agencies around the world, in applications such as tracking money laundering and insider trading , as well as more covert applications. Insurance and retail fraud are other important applications. m Kaya wrote:Thank you Ross for the great articl.[

Network 74
article thumbnail

Facebook and portals in the workplace - Trends in the Living Networks

Trends in the Living Networks

story and some of the more balanced media response , Sophos, another internet security company, has released survey results saying that half of all companies restrict access to Facebook. Apparently 43% block Facebook outright, while 7% more give access only when it is deemed relevant. m Kaya wrote:Thank you Ross for the great articl.[

Trends 60
article thumbnail

2008 will be the year of Enterprise 2.0 - Trends in the Living Networks

Trends in the Living Networks

Second is that so many employees are already using online applications and web tools because it’s easier than asking IT to get things done, so companies will prefer to offer them robust, secure applications rather than incur the risk of things not being done well. Third is that using Web 2.0

Trends 60
article thumbnail

Social networks, data mining, and intelligence - Trends in the Living Networks

Trends in the Living Networks

I have no doubt that the analysis techniques used on this data were primarily network mapping, using software such as Netmap , which I described in an earlier article on social networks and intelligence applications. Searching for patterns in this data is a network analysis application, and the state of the art is pretty good now.

Network 68
article thumbnail

An Enterprise 2.0 Governance Framework – looking for input! - Trends in the Living Networks

Trends in the Living Networks

For example, almost every technology security expert says that network penetration risks (malicious access to the organization’s IT systems) are no different using Web 2.0 Who is responsible for service/applications development? Who is responsible the service/applications ecosystem? is: * The application of Web 2.0