Now-a-days every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either … Read more >
The post Big Data, IoT, API …….Newer technologies protected by older security. appeared first on Application Security.
Hey. What’s up. Yeah, so, I took last year off from blogging here. But there are a lot of things to share about what we’re doing in Human Resources for employees, so I’m back. This is also a good time … Read more >
The post Ask Ivy appeared first on Jobs@Intel Blog.
Kin Lane has started tracking what he calls API Brokers over at API Evangelist. This quote illustrates the promise of API brokerage: I envision other new API brokers emerging, in niche areas like images, video or messaging. Imagine if you could … Read more >
The post Be Your Own Broker: An Enterprise Perspective using API Management appeared first on Application Security.
Getting a new PC used to take valuable time out of the workday. But as part of our focus on a user-centered model of delivering IT services, Intel IT recently optimized our PC delivery process, resulting in improved employee productivity, a… Read more
I saw a conversation today on Twitter that asked why we don’t just embed proper security into Hadoop instead of suggesting the API gateway approach to Hadoop security that my colleague Blake proposed. The same could be asked about any number … Read more >
The post Hadoop Security: Internal or External? Why not both! appeared first on Application Security.
Join us Wednesday, May 22 at 10:00a Pacific / 1:00p Eastern for our next webinar with Capital One and Mashery: APIs are a hot topic in all sectors of IT – they have gone from being niche solutions provided by … Read more >
The post Our Next Webinar: Five Practical Steps to Building an Enterprise Class API Program appeared first on Application Security.
Bring Your Own Devices (BYOD) continues to gain momentum as users bring devices into work environments by the droves. Enterprises must make tricky security decisions to balance the tradeoffs of costs, user productivity, and security. … Read more
Note from the editor: Here’s yet another beautiful blog post shared on our intranet from one Intel employee to another. Regardless of if you have kids or not, I think we can all agree that being a parent is the … Read more >
The post A Mother’s Day letter to a new Intel mom appeared first on Jobs@Intel Blog.
I just wanted to send a short note that I will be talking about API Management strategy & health care data at the Health Refactored conference next week in Mountain View. I’m hoping to learn a lot of and also … Read more >
The post Health 2.0 and API Management appeared first on Application Security.
Intel IT has standardized on Intel® Xeon® processors with a core frequency of 2.6 gigahertz (GHz) for two-socket servers to offer maximum IT value for design computing and enterprise server virtualization. Our analysis demonstrates that higher-… Read more
Earlier this year, Intel IT started conducting a series of Cloud Aware “Code-a-Thon’s”. These were created in response to a skills gap around applications that were being written in a traditional way and ones that needed to be d… Read more
Managing the Changing IT Landscape: Technology in Healthcare The role of technology in healthcare today is undeniable. What’s really interesting, though, is that we still have a long, long way to go. I wanted to share this powerful TED… Read more
Last February, President Obama issued Executive Order 13549: Improving Critical Infrastructure Cybersecurity. Its intent is to drive new levels of security into the critical infrastructure of the U.S., systems like dams, the power grid, transportation … Read more
Visionmobile released a new info-graphic earlier this week that puts some spotlight back on HTML5. While HTML5 is in third place compared to Android and iOS for development and deployment platforms, the most interesting aspect of the survey is the … Read more >
The post All Eyes on HTML5 appeared first on Application Security.
Talk live with an Intel IT Center expert: Sure, Big Data is a big deal. But with new sources and growing volumes of data flooding in daily, how do you turn all of that data into meaningful insights that give your business a competitive advantage?… Read more
It’s springtime and there is a buzz in the air. The API Management market place is heating up. Businesses are seeing the value in exposing data. In the world of Healthcare IT, the drive to accelerate electronic health record adoption collides … Read more >
The post API Management for Healthcare appeared first on Application Security.
Managing the Changing IT Landscape: User-Centered ComputingAre you ready to let users determine what IT services you deliver? Like it or not, they’re already using their own devices, not to mention the cloud-based services they want. Wouldn’t it … Read more
Last year the Open Data Center Alliance published an excellent whitepaper that defined the concept of “cloud-aware” applications. The ODCA paper sets forth the following recommendations: Everything is a Service Use RESTful APIs Separate Compute and Persistence Design for Failure … Read more >
The post Cloud-Aware Tokenization: Helping to Build PCI-Compliant Applications in the Cloud appeared first on Application Security.
Note from the editor: You hear from me quite a bit, whether it’s through a blog post or as a response to a comment or an introduction to a guest blogger, but you don’t hear from two of my teammates … Read more >
The post Intel Employees: A Special Tribute to a Special Teammate appeared first on Jobs@Intel Blog.
The Desktop PC has been the workhorse of the computer industry ever since the personal computer was first invented. It offers the highest performance and greatest configuration flexibility of any PC form factor (which is why it remains popular with the… Read more