Emphatic excitement is how I felt when I saw this news from the hotel technology trade association, also known as HTNG. The idea of deleting data for compliance scope is certainly not new, but the key idea that HTNG discovered … Read more >
The post The move towards proxy tokenization – first retailers, now hotels appeared first on Application Security.
Over the past few years, IT has really had to begin developing a new partnership with its users. With rapid changes in technology, and the needs as well as demands of employees, IT has had to create new flexibility and greater choice for workers. Intel… Read more
We drink it. We swim in it. We’re made of it. Today is World Water Day, an annual day to focus on the importance of freshwater and advocate for the sustainable management of freshwater resources. At large companies – including … Read more > Read more
Author of this blog is the research scientist on virtual environments:Liu, Huaiyu With the advent of cloud technologies we now have the capability to stay connected from anywhere, anytime. With the recent changes in my family I want to stay … Read more > Read more
With today’s release of the caveman cartoon comedy “The Croods,” DreamWorks Animation has doubled the feature film output of rival “Pixar.” For those keeping score, it’s now 26 to 13 in favor of the studio that “Shrek” built. That’s no slouch of a milestone and almost tops the one DreamWorks Animation reached a few years… Read more > Read more
I’m not saying I’m like Gonzaga, but I totally am. You see, Gonzaga is a small school ready to topple … Read more
mHigh volume manufacturing facility, like the ones we have at Intel, requires some serious computing power to run all the automation systems we need to be at the top of the league table in the manufacturing world. Yet this computing power is not going … Read more
I’d like to expand on “rjcarlet”‘s blog “Cloning/Copying Systems to Reduce Build Times for a *NIX System. and touch on a method I found to work well in Intel IT. Network based cloning is not new, but I could not find any free solutions out t… Read more
Note from the editor: Misconceptions can be funny sometimes. You think you know something and then all of a sudden, boom, your world is changed! Today’s guest blogger, José Julián, aka JJ, has gone through the experience many times when … Read more >
The post The Inside Scoop on Intel Costa Rica appeared first on Jobs@Intel Blog.
KuppingerCole analyst Craig Burton (of Burton Group originally) wrote a recent article about Façade proxies. You can read the article here: http://blogs.kuppingercole.com/burton/2013/03/18/the-faade-proxy/ As Craig notes, “A Façade is an object that provides simple access to complex – or external – … Read more >
The post The Façade Proxy appeared first on Application Security.
Intel Extreme Masters Season 7 has come to an end, the World Championships at CeBIT, in Hannover Germany, brought the entire season to a dramatic, heart pounding conclusion. Stops at Gamescom, Singapore, Cologne Germany, Katowice Poland and Sao Paulo Brazil brought 24 players and 12 teams together to see who would become the new World… Read more > Read more
Managing the Changing IT Landscape: App Stores in the Enterprise I’ve talked a bit about consumerization strategy in a recent blog post, and by default, a huge part of success involves change. As consumer trends continue to drive their way i… Read more
Thanks to the Internet, learning something new every day is no problem. But do we really want to learn much … Read more
Walk into any technology company and you’ll notice a trend across all of them: there are more males than females in technical roles. While the number of females at technology companies has increased over the years, we were determined to … Read more >
The post Highlighting Our Culture: Female Technical Day at Intel Poland appeared first on Jobs@Intel Blog.
I am speaking at the SC World eConference this Wednesday (12:25 PM – 01:05 PM) with our customer WestJet on PCI Compliance/ Cloud Data Privacy issues. You can register at the link below. It is free. Plus you earn CPE … Read more >
The post PCI / Cloud Data Privacy webinar – Wednesday Mar/20 @ 12:25 pm appeared first on Application Security.
Lately, “how’s the weather where you are?” has been a more interesting conversation starter than usual. From superstorms to blizzards, forecasters are predicting dire weather events on an almost weekly basis. Whether these predictions actually come true, however, is another matter and has led to some embarrassing moments for local and national forecasters. The most recent… Read more > Read more
This week Intel heads to TV Connect 2013 to highlight its solutions for set-top boxes, media servers, and video gateways. Held in London, the event bills itself as ‘the world’s leading event on connected entertainment’ and attracts broadcasters, Telco pay … Read more > Read more
Disclaimer: I am NOT a guidance counselor. Proceed with caution here people. I keep getting a question from my student audience and felt it was probably time I answered the question for the masses, vs responding one by one with … Read more >
The post Guidance from a Recruiter — Follow at Your Own Risk appeared first on Jobs@Intel Blog.
The DMZ is a Web app security architecture workhorse. The DMZ operates under a different ruleset both in terms of what is allowed and in terms of the level scrutiny design, deployment and operations get. To the extent Web security … Read more >
The post What Comprises a Mobile DMZ? appeared first on Application Security.
Teenager. It’s a word that can inspire angst for even the most experienced parents. They’re rowdy, rebellious, rambunctious, and generally difficult to deal with. But if you’d been in our nation’s capital just yesterday, you’d have seen the word “teenager” … Read more > Read more