Tech

SharePoint Security: How to Harness the Power of Claims to Protect Information

In SharePoint 2010, Microsoft introduced support for a claims-based identity model. Claims can be used in SharePoint 2010 to enhance security in two different ways. First, they can enhance authentication in SharePoint by going beyond traditional authentication methods to verify additional information about users. Claims can also greatly enhance authorization specifically within the SharePoint 2010Read… Read more »

How the Federal Government is Slowly Embracing Mobile by AlexOlesker

Mobile computing, primarily smartphones and tablets, is one of the most disruptive technologies today. Increasingly sophisticated portable personal computers are providing unprecedented opportunities to work from anywhere and access solutions wherever and whenever they are needed, leading to great productivity gains. Yet mobile computing in the enterprise also brings security risks by introducing many newRead… Read more »

Holiday Stress Management 1.0 : Five Tips for Reducing or Alleviating Stress This Holiday Season!

How many dinners and parties and office engagements have you been invited to this holiday season? Are you really ready for this? Emotionally and physically? Try not to think about what you were doing last year! Have you decided not to attend most of them? Perhaps you”re alone(relationship) this year and would rather just getRead… Read more »

GovBytes: NC Now Checking Out E-Library Books

An article in GovTech last Friday reported that public libraries in North Carolina are now checking out e-library books. The North Carolina Digital Library Consortium released a collection that can be downloaded directly from the library onto the patron’s Kindle or Kindle reading app. While this service is more convenient for the public, it isRead… Read more »

Invincea Continues to Gain Momenturm

We’ve already covered how odds are your software applications aren’t secure. Threats and attack vectors seem to expand faster than solutions, and many solutions are employed sub-optimally due to poor updating, patching, and information management. And conventional tools can’t protect users against targeted attacks like spear phishing, which rely on flaws in judgement rather thanRead… Read more »

Me on The Future of Collaborative Enterprise

French collaboration expert, Thierry De Baillon and his colleagues have been working on a project entitled The Future of Collaborative Enterprise, that, in their words is intended to be: … a laboratory, an attempt to pave the path to a plausible future, by drafting actionable scenarios of what “social” organizations might look like and operateRead… Read more »

The Direct Economy

How To Profit From The Most Lucrative Market In The History Of The World! A Tale Of Two Resorts Orlando, Florida and Carolina’s Outer Banks (OBX) are two areas on the east coast where people go to enjoy the weather, vacation and be entertained. Orlando, with a major airport, Walt Disney, Universal Studios, SeaWorld, Legoland,Read… Read more »

Big Data Fights Crime: The FBI’s Next Generation Identification

The Federal Bureau of Investigation has been in the Big Data business since 1999 when it launched the Integrated Automated Fingerprint Identification System (IAFIS), the world’s largest biometric database on individuals. IAFIS contains over 55 million sets of fingerprints and is used by law enforcement agencies nationwide for criminal investigations and civil background checks. ToRead… Read more »