Remove Architecture Remove Mobile Remove Operating Systems Remove Transportation
article thumbnail

American Airlines Adopts Public Cloud Computing

Cloud Musings

Did you know that the reservations systems of the biggest carriers mostly run on a specialized IBM operating system known as Transaction Processing Facility (TPF). In a recent announcement the carrier said that it will be moving it’s its customer-facing mobile app and their global network of check-in kiosks to the IBM Cloud.

Airlines 123
article thumbnail

7 enterprise mobile app trends to watch in 2018

mrc's Cup of Joe Blog

Summary: The demand for enterprise mobile apps is growing. In this article, we explore 7 enterprise mobile app trends you can’t ignore this year. photo credit: FirmBee via pixabay cc There’s a growing gap between mobile usage and enterprise mobile app development over the last few years. Dinsmore , Ph.D.,

Mobile 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Many billions of people use a PC (or mobile device) to perform tasks important to them without significant skill. Figure 2: Binding of controller, authentication factors, and identifiers in identity systems. This is a heterarchy; there is no inherent ranking of nodes in the architecture of the system. click to enlarge).

Internet 135
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

AWS Security Essentials – This course prepares learners to be more security-minded with their architecture in AWS. Secure Socket Layer (SSL) Fundamental s – The backbone of securing network communications through encryption are Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS).

Course 25
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

AWS Security Essentials – This course prepares learners to be more security-minded with their architecture in AWS. Secure Socket Layer (SSL) Fundamental s – The backbone of securing network communications through encryption are Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS).

Course 12
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

With the proliferation of mobile devices, the perimeter became porous than non existent. Those have much less security much many fewer capabilities and architectural stability built into them, but again it's, it's the lowest common denominator it's like web 1.0 In some cases the artists simply don't have the resources to be updated.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

With the proliferation of mobile devices, the perimeter became porous than non existent. Those have much less security much many fewer capabilities and architectural stability built into them, but again it's, it's the lowest common denominator it's like web 1.0 In some cases the artists simply don't have the resources to be updated.