Security

{file_name}

Guest Post: Data Quality as an Initiative

By David Guimbellot    |    December 16, 2014    |    Development and Testing

​This article was authored by David Guimbellot and was originally published on Orasi's "Eye on Quality" blog. If your business is capturing or coordinating persistent data as a primary function...

{file_name}

​The Ethics of Cloud Computing - Part 1

By Seth Payne    |    December 15, 2014    |    Development and Testing, IT Operations

Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the...

{file_name}

Now Available: Removing Barriers to Continuous Delivery of Business Value

By Noel Wurst    |    November 07, 2014    |    Development and Testing

​Many organizations are recognizing that faster application delivery leads to better business results, but they struggle with how to overcome their barriers to faster delivery. In this webinar, guest speaker...

{file_name}

Your Healthcare, Your Cloud, and HIPAA

By Lee Slaughter    |    November 04, 2014    |    Development and Testing, Product Development, IT Operations

Healthcare companies once considered the idea of managing any computing activities in the cloud a distant future due to ever-tightening standards of patient privacy. But software development and testing workloads...

{file_name}

On-premises Data Masking for Increased Cloud Testing Security

By Noel Wurst    |    October 28, 2014    |    Development and Testing, Product Development

​We recently hosted a webinar with one of our partners, Axis Technology, to demonstrate how their DMSuite® tool ensures that sensitive production data remains secure, while also providing testers with ...

{file_name}

Sex Tape Leads Viewers to Believe Cloud Is Still a “Mystery”

By Noel Wurst    |    July 29, 2014    |    Development and Testing

​History has shown that most sex tapes that have been publicly released, whether both parties intended them for our viewing or not, are often far less sexy than the on-camera...

{file_name}

The Heartbleed Security Vulnerability and What It Means for Skytap

By Skytap    |    April 11, 2014    |    Product Development

You may have heard about the recent security vulnerability known as "Heartbleed.” Researchers have discovered a vulnerability in OpenSSL (a cryptographic software library that protects many services on the Internet)...

{file_name}

Caught! The Real Culprit of Shadow IT

By Noel Wurst    |    March 13, 2014    |    IT Operations

Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I...

{file_name}

CES 2014 Sees Increased Interest in the Enterprise

By Noel Wurst    |    January 10, 2014    |    Development and Testing, IT Operations

There was a time when CES was essentially only a toy store. That may sound absurd, but it’s true. The TVs, phones, video game systems, and computers were for...

{file_name}

Your Move to the Cloud: An Interview with Fulcrum Technologies’ Paul Haury

By Noel Wurst    |    December 17, 2013    |    Development and Testing, IT Operations

Fulcrum Technologies IT Director Paul Haury sits down with Noel Wurst to explain what made Fulcrum look to the cloud to alleviate the pain points they were experiencing in the...