Inside the Briefcase

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A...

Still keeping your hybrid power systems indoors?  It’s time for change.

Still keeping your hybrid power systems indoors? It’s time for change.

Mobile telecommunications network equipment is expected to work without...

As the Network Changes, Engineers Are Embracing the DevOps Model

As the Network Changes, Engineers Are Embracing the DevOps Model

Businesses that have embraced digital transformation with a clear...

The 5 Most Common Application Bottlenecks

The 5 Most Common Application Bottlenecks

Application bottlenecks can lead an otherwise functional computer or...

The Rise of Cybervigilantism

December 17, 2010 No Comments

Things took an interesting turn in the aftermath of Cablegate, which saw 250,000 documents, many of them sensitive, put on the open Web by WikiLeaks.

Julian Assange, the founder of the site, has been charged by Swedish police with a sex crime; the U.S. government is seeking to try Assange, who’s currently out on bail; hundreds of mirrored WikiLeaks sites have sprung up around the world; WikiLeaks supporters have launched DDoS attacks on the websites of anyone taking action against the whistleblower site; and free speech advocates have criticized actions against WikiLeaks.

 Read More…

APPLICATION INTEGRATION, Featured Articles

Leave a Reply

(required)

(required)


ADVERTISEMENT

bpm online Boston May 11

UC Expo

SSOW

sptechcon

ITBriefcase Comparison Report