It’s apps that always get the glory don’t they? After reflecting on my talk at the Health Refactored conference in Mountain View last week, I saw a lot of focus on the consumer and client side of the healthcare API … Read more >
The post Where do secure, private and compliant APIs come from? appeared first on Application Security.
API Evangelist Kin Lane has just released a new paper that provides an overview of the Backend as a Service space. Kin’s research does a great job covering the breadth of tools and services that get lumped in under the … Read more >
The post Cloud Service Brokerage: Enabling MBaaS for the Enterprise appeared first on Application Security.
Managing the Changing IT Landscape: User-Centered Computing In my recent blog, “It’s time to put users first” I wrote about user-centered computing, a strategy for embracing consumerization that puts users first. Much like user-c… Read more
Now-a-days every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either … Read more >
The post Big Data, IoT, API …….Newer technologies protected by older security. appeared first on Application Security.
Hey. What’s up. Yeah, so, I took last year off from blogging here. But there are a lot of things to share about what we’re doing in Human Resources for employees, so I’m back. This is also a good time … Read more >
The post Ask Ivy appeared first on Jobs@Intel Blog.
Kin Lane has started tracking what he calls API Brokers over at API Evangelist. This quote illustrates the promise of API brokerage: I envision other new API brokers emerging, in niche areas like images, video or messaging. Imagine if you could … Read more >
The post Be Your Own Broker: An Enterprise Perspective using API Management appeared first on Application Security.
Getting a new PC used to take valuable time out of the workday. But as part of our focus on a user-centered model of delivering IT services, Intel IT recently optimized our PC delivery process, resulting in improved employee productivity, a… Read more
I saw a conversation today on Twitter that asked why we don’t just embed proper security into Hadoop instead of suggesting the API gateway approach to Hadoop security that my colleague Blake proposed. The same could be asked about any number … Read more >
The post Hadoop Security: Internal or External? Why not both! appeared first on Application Security.
Join us Wednesday, May 22 at 10:00a Pacific / 1:00p Eastern for our next webinar with Capital One and Mashery: APIs are a hot topic in all sectors of IT – they have gone from being niche solutions provided by … Read more >
The post Our Next Webinar: Five Practical Steps to Building an Enterprise Class API Program appeared first on Application Security.
Bring Your Own Devices (BYOD) continues to gain momentum as users bring devices into work environments by the droves. Enterprises must make tricky security decisions to balance the tradeoffs of costs, user productivity, and security. … Read more
Note from the editor: Here’s yet another beautiful blog post shared on our intranet from one Intel employee to another. Regardless of if you have kids or not, I think we can all agree that being a parent is the … Read more >
The post A Mother’s Day letter to a new Intel mom appeared first on Jobs@Intel Blog.
I just wanted to send a short note that I will be talking about API Management strategy & health care data at the Health Refactored conference next week in Mountain View. I’m hoping to learn a lot of and also … Read more >
The post Health 2.0 and API Management appeared first on Application Security.
Intel IT has standardized on Intel® Xeon® processors with a core frequency of 2.6 gigahertz (GHz) for two-socket servers to offer maximum IT value for design computing and enterprise server virtualization. Our analysis demonstrates that higher-… Read more
Earlier this year, Intel IT started conducting a series of Cloud Aware “Code-a-Thon’s”. These were created in response to a skills gap around applications that were being written in a traditional way and ones that needed to be d… Read more
Managing the Changing IT Landscape: Technology in Healthcare The role of technology in healthcare today is undeniable. What’s really interesting, though, is that we still have a long, long way to go. I wanted to share this powerful TED… Read more
Last February, President Obama issued Executive Order 13549: Improving Critical Infrastructure Cybersecurity. Its intent is to drive new levels of security into the critical infrastructure of the U.S., systems like dams, the power grid, transportation … Read more
Visionmobile released a new info-graphic earlier this week that puts some spotlight back on HTML5. While HTML5 is in third place compared to Android and iOS for development and deployment platforms, the most interesting aspect of the survey is the … Read more >
The post All Eyes on HTML5 appeared first on Application Security.
Talk live with an Intel IT Center expert: Sure, Big Data is a big deal. But with new sources and growing volumes of data flooding in daily, how do you turn all of that data into meaningful insights that give your business a competitive advantage?… Read more
It’s springtime and there is a buzz in the air. The API Management market place is heating up. Businesses are seeing the value in exposing data. In the world of Healthcare IT, the drive to accelerate electronic health record adoption collides … Read more >
The post API Management for Healthcare appeared first on Application Security.
Managing the Changing IT Landscape: User-Centered ComputingAre you ready to let users determine what IT services you deliver? Like it or not, they’re already using their own devices, not to mention the cloud-based services they want. Wouldn’t it … Read more