Remove 2015 Remove Applications Remove Architecture Remove Programming
article thumbnail

What is TOGAF? An enterprise architecture methodology for business

CIO Business Intelligence

The Open Group Architecture Framework (TOGAF) is an enterprise architecture methodology that offers a high-level framework for enterprise software development. Businesses can, however, have tools, software or training programs certified by The Open Group. TOGAF definition.

article thumbnail

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

Start by understanding the environment to be protected, including all applications in play. Decide which of the applications are legitimate for the environment, and whitelist those to prevent dangerous and unnecessary applications from running. Microsoft Outlook Email Hacked In China (techweekeurope.co.uk).

Network 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Liveblog: DockerCon 2015 Day 2 General Session

Scott Lowe

This is a liveblog from the day 2 general session at DockerCon 2015. Over 800+ participants participated in the private beta and the early access program for DTR—this included companies like GE, Capital One, Disney, and others. Here’s what I was able to capture. Johnston offers a few previews of the user interface for DTR.

article thumbnail

Chipotle’s recipe for digital transformation: Cloud plus AI

CIO Business Intelligence

When Curt Garner became Chipotle’s first CIO in 2015, the only technology used for online restaurant ordering was, “believe it or not,” a fax machine, he says. We really like their cloud-based AI program,” Garner says. “It It allows us to build models and applications very quickly and with transparency.

Cloud 145
article thumbnail

Why Kubernetes Is So Popular in the Tech World

Galido

However, even though the project was promising, in 2015, Google released this tool as an open-source project. This tool automates deploying, scaling, and managing containerized applications on a cluster of servers (virtual or bare metal). You cannot possibly deny that Kubernetes is built on a very mature and proven architecture.

article thumbnail

Networking the Cloud for IoT - Pt. 2 Stressing the Cloud

Cloud Musings

CarnegieMellon’s Computer Emergency Response Team (CERT) , in fact, found that 64% of vulnerabilities in the CERT National Vulnerability Database were the result of programming errors.” Companies like Programming Research, Critical Software, or Jama Software offer tools to assist with static analysis of code against these standards.

Cloud 70
article thumbnail

Technology Short Take #58

Scott Lowe

This will be the last Technology Short Take of 2015, as next week is Christmas and the following week is the New Year’s holiday. It says the the JET (Juniper Extension Toolkit) uses “open application programming interfaces”, but fails to provide any specifics. Operating Systems/Applications.

Vmware 60