Remove 2012 Remove Linux Remove Malware Remove Social
article thumbnail

The Next Tech Battle: Chrome OS vs. Office Web Apps - Social.

Social, Agile and Transformation

Social, Agile, and Transformation. I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Social, Agile, Transformation Pages. social media. (3).

Social 100
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

After two years as product manager for Zing at Azul Systems, she joined Cloudera in 2012 to help drive the future of distributed data processing through Cloudera''s Distribution of Hadoop. We feature news, commentary, podcasts, analysis and social media connections in domains of Big Data, Gov2.0, Air Force (USAF) C4ISR career.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

After two years as product manager for Zing at Azul Systems, she joined Cloudera in 2012 to help drive the future of distributed data processing through Cloudera''s Distribution of Hadoop. We feature news, commentary, podcasts, analysis and social media connections in domains of Big Data, Gov2.0, Air Force (USAF) C4ISR career.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And those four hundred and ninety six characters probably included recently used encryption keys, passwords, social security numbers, and other PII. I got my start writing about malware, this was back even before the term malware existed.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And those four hundred and ninety six characters probably included recently used encryption keys, passwords, social security numbers, and other PII. I got my start writing about malware, this was back even before the term malware existed.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And those four hundred and ninety six characters probably included recently used encryption keys, passwords, social security numbers, and other PII. I got my start writing about malware, this was back even before the term malware existed.