article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Application Software Security. href="[link] Control 6: Application Software Security. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. href="[link] Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. Washington DC, October 24, 2011.

Security 278
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

What Is Meant by a "Cloud-Ready" Application? unique network topology (including load balancing, firewalls, etc.). They dont interact with the applications unique. solution if you really understand the specific application. OASIS Topology and Orchestration Specification for Cloud Applications (TOSCA). Fountainhead.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

“It’s about optimizing the cloud workload, rewriting some of the applications, and, [as] ESG comes into the big picture, how we can be more efficient to reduce Co2 emissions.” Cathay launched its cloud journey four years ago, and its migration has accelerated over the past three years.

Cloud 119
article thumbnail

Back-to-the-Future Weekend Reading - CryptDB - All Things.

All Things Distributed

Whether in-the-cloud or on-premise there is a shift to a model where individual applications need to protect themselves instead of relying on firewall-like techniques. That goes especially for the interaction between applications and storage engines, and between applications and databases. Contact Info. Werner Vogels.

article thumbnail

SeanDaniel.com [tech]: How to use your Home Server as an AirPrint.

Sean Daniel

I found an application for Windows (and Mac OS) that installs on your computer that shares almost any printer connected to the computer, to the AirPrint service. This application, called FingerPrint by Collobos Software , will share out any connected printer, as well as DropBox locations to the AirPrint service. Posted by Sean Daniel.

How To 64
article thumbnail

How does your SaaS vendor respond to the scalability question.

Social, Agile and Transformation

Ask some CTO’s about how their product scales and they’ll whip out a logical diagram showing you redundant networks, redundant firewalls, load balancers, clustered application servers, redundant databases, and SAN storage. ► 2011. (14). How does your SaaS vendor respond to the scalability question?

article thumbnail

Fountainhead: Profiling questions nobody's asking re: cloud.

Fountainhead

Profiling questions nobodys asking re: cloud applications. But so little attention is being paid to identifying & profiling which applications are best-suited to actually run in an external "cloud." of what ideal application properties pre-dispose apps for being well-suited to run in a cloud. Tuesday, May 12, 2009.

Cloud 186