_Managing the Changing IT Landscape: Ultrabooks for Business If you’ve been reading my blogs, you know that finding the right tool for the job is an ongoing theme. And it deserves the attention … in a consumerized IT world, there are simpl… Read more
Recent Blog Posts
The evolution of threats to the security of the enterprise has driven innovation in how that enterprise defends itself. New tools need to be developed to meet today’s threat landscape. McAfee has introduced such a tool, Deep Defender. It’s … Read more
The continuing transformation of the IT industry around the externalization of service components constitutes an exercise in abstraction. The transformation assumes that any IT application can be recursively decomposed into constituent services. An application that has been re-architected or engineered … Read more >
The post From ESBs to API Portals: an Evolutionary Journey Part 4 appeared first on Application Security.
Managing the Changing IT Landscape: Business-Class Technology I recently blogged about how I define business-class technology and what separates it from the pack. It’s no longer a luxury, but a necessity (unlike that upgrade from coach &hel… Read more
Over the next several posts, I will explore some of the core patterns for Service Gateways that provide access to Enterprise Mobile Applications that need to leverage enterprise apps and data. Before I go there – a word about risk. … Read more >
The post Betwixt and Between – Service Gateway for Enterprise Mobile Applications appeared first on Application Security.
Fellow security professionals, come join me at the Intel IT Center Experts tour in Folsom CA, June 13th 2013. I will be one of the many speakers discussing challenges and experiences gained by Intel’s IT organization. This is an opportunity… Read more
In my initial overview, I stated that I felt that there were 3 items necessary for innovation. The first, the resources, I covered in my first entry. This one is geared towards the second which is the Culture to support innovation. THE CULTU… Read more
Security means many different things in different contexts. With Information Security, it should be about protection of an asset from a known threat. But many times there are biases to security solutions based on controls that are predetermined. The mo… Read more
Note from the editor: Every Intel employee has a story behind their career path and how they got to where they are. Today we bring you Carlos’s story which is not only about his Intel career, but how he went … Read more >
The post From Collecting Coffee Beans to Advising the Government appeared first on Jobs@Intel Blog.
Managing the Changing IT Landscape: Business-Class Technology In a recent blog post, I proposed the idea that business-class technology is not a luxury. When it comes to protecting sensitive company information and IP, as well as customer data, it… Read more
Tokenization is a major trend in application and data security and Gateways are an ideal location to deploy tokenization services. Tokenization replaces sensitive data with benign data. The classic example here is PCI DSS, and the business value of tokenization … Read more >
So, here are some questions that have been on my mind lately: How can Enterprises reduce cost drivers for mobile enablement? Can APIs and HTML5 provide the basis for a long term mobile strategy? Can Enterprises avoid lock-in with mobile … Read more >
Even a 10 year old little girl can prove this fact: A 10-year-old girl thwarted an abduction attempt after asking a stranger for a code word that he did not know.A man approached a 10 year old girl outside a public school and attempted to lure th… Read more
A few weeks ago I blogged about different Mobile Middleware usage models for enterprise. Continuing that thread, this post will drill down into API security considerations for enterprise mobile apps. Mobile applications are typically intended for use outside of the … Read more >
The post Mobile Middleware for the Enterprise: API Security Considerations appeared first on Application Security.
Intel has implemented a new granular trust model to improve security throughout the enterprise. It’s designed to support key initiatives like IT consumerization and cloud computing. At the same time Intel wants to keep the user experience as seam… Read more
Managing the Changing IT Landscape: Touch-Enabled PCs in the Enterprise A couple of weeks ago, I posted a blog on the emergence of enterprise app stores as a way for IT to gain better control. Today, I want to go one step further: I believe that … Read more
Are you a Doctor Who fan? Of course you are because you have access to the Internet! If you’ve not … Read more
1. How to Enter
Scan the NFC tags around the booth (Easter Eggs) and you will receive a URL. Go to URL and answer 4 questions. Hand in your business card with the 4 digit code you receive after ticking the answers and you will enter the raffle… Read more
I’ve been to 22 different Intel campuses in 6 different countries in my 14 years at Intel. One thing is consistent – Intel employees’ spirit of wanting to always do better. Always wanting to BE better. It’s in our DNA. … Read more >
OpenCL Developers Kit 2013 Now Available with support for OpenCL 1.2 and future 4th Gen Intel® Core™ Processor
If you’re working on a cutting-edge visual computing application, download the new release the Intel® Software Development Kit (SDK) for OpenCL Applications 2013 to realize efficiency, performance and power savings. The new SDK includes certifie… Read more