FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “security”

Showing 601 - 609 of 609

TECH

EMC eases path to corporate clouds

Database, Suchit Leesa-nguansuk, Published on 10/03/2010

» Recognising customer demand to simplify complex IT systems and reduce costs is accelerating adoption by businesses of virtual computing models and driving EMC to adopt an aggressive strategy to enter the private-community cloud as well as the IT system management market.

TECH

Analytics tackle fraud, security issues

Database, Suchit Leesa-nguansuk, Published on 03/03/2010

» SAS is pushing "text mining" technology and social network analysis to help the government tackle fraud, terrorism and national security threats, while leveraging private clouds to cut licensing costs in the enterprise market.

TECH

Mirasys sees opportunity in Thai market

Database, Suchit Leesa-nguansuk, Published on 24/02/2010

» Turning an unstable situation into an opportunity has led a top Finnish surveillance software company to select Thailand as a base to build a research centre and pave the way for Thai software developers to reach a global market.

TECH

Data law draft raises fears over user privacy

Database, Suchit Leesa-nguansuk, Published on 24/02/2010

» Law experts have raised criticisms of Thailand's Data Protection Law draft, saying that there are several issues requiring amendment, especially concerns over abuse of power.

TECH

IDC issues positive figures

Database, Suchit Leesa-nguansuk, Published on 17/02/2010

» Fierce competition and concern over costs will drive enterprises to continue spending on IT, pushing single-digit market growth. Data services as well as social media for smart phones will drive the telecom market, which is expected to grow if 3G is fully implemented, according to the top 10 ICT trend predictions for Thailand from IDC.

TECH

NetApp collaborates to expand services

Database, Suchit Leesa-nguansuk, Published on 10/02/2010

» Weera Areeratanasak, Country Manager of NetApp (Thailand), said the company, together with Cisco and VMware, has expanded its services to deliver end-to-end Secure Multi-tenancy Design Architecture that provides enhanced security in shared virtual and enterprise cloud environments by isolating the information technology resources and applications of different clients, business units or departments that share a common IT infrastructure.

Image-Content

TECH

Data-interception technology sparks privacy vs safety arguments

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» Experts have raised concerns over whether using Sniffer software to resolve suspicious internet activity violates the Computer-related Crime Act B.E. 2550.

TECH

Social sites, cloud computing pose new threats

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» The increasing popularity of social networking and new technology development in cloud and virtualisation environment as well as new operating systems create loopholes for security threats in 2010.

Image-Content

TECH

Computer villains beware - digital forensics gather pace

Database, Suchit Leesa-nguansuk, Published on 20/01/2010

» In the physical world, the police need help from forensic teams to collect evidence to solve crimes and catch culprits. Similarly, in the digital world, digital forensics are a crucial part of the fight against cyber criminals and hackers. The evidence these professionals can gather against suspects can be presented in court.