¿HAS PERDIDO TUS DETALLES?

Noticias y Artículos

Si quieres estar actualizado y al día con la última tecnología, aquí encontraras noticias al momento de su publicación, de fuente de nuestros principales aliados en TI, empresas lideres en el ramo y que marcan la pauta en el mundo.

Oracle-Sponsored Survey Finds Enterprises Expect to Boost Mobile-Related IT Expenses More than 50 Percent in Two Years, yet Security and Integration Remain Top Challenges Survey Highlights Critical Technology Challenges and Business Opportunities as Enterprises Embrace Both Internal and External Mobile Strategic Initiatives Redwood Shores, Calif. – July 31, 2014News SummaryThe rapid [...]
Jue, jul 31, 2014 5:35:00 PM, Continue reading at the source
Oracle Solaris 11.2 Now Generally AvailableComplete cloud platform allows enterprises to accelerate their move to cloud Redwood Shores, Calif. – July 31, 2014News Summary Now generally available, Oracle Solaris 11.2 accelerates your ability to deploy enterprise cloud computing with an efficient, secure, compliant, open, and affordable cloud platform. Engineered for cloud and [...]
Jue, jul 31, 2014 4:00:00 PM, Continue reading at the source
Oracle Identity Management Achieves Significant Customer and Partner AdoptionComplete and integrated, next-generation identity management suite helps customers and partners efficiently secure the extended enterprise Redwood Shores, Calif. – July 31, 2014 News SummaryAs organizations build a strategy for digital transformation, they are seeking a unified approach to enterprisewide identity management that [...]
Jue, jul 31, 2014 3:30:00 PM, Continue reading at the source
Mie, jun 11, 2014 12:00:00 PM, Continue reading at the source
Mar, jun 10, 2014 6:59:00 PM, Continue reading at the source
There is a vulnerability in the way Apache Struts 2 cookieinterceptor disallows certaincookie names that can allow an attacker to manipulate session and requestrelated attributes. [...]
Mie, may 14, 2014 4:00:00 AM, Continue reading at the source
A memory corruption vulnerability exists in Microsoft Internet Explorer 6, 7, 8, 9, 10 and 11 and can lead to remote code execution. Exploitation of this vulnerability has been observed in targeted attacks, such as "Operation Clandestine Fox." [...]
Mie, abr 30, 2014 4:00:00 AM, Continue reading at the source
A vulnerability in Apache Struts, can allow an attacker to send HTTP requests and achieve remote code execution on the server, i.e. the attacker attains the privilege of running any code in the environment that the web server is running. A proof-of-concept (PoC) exploit has been found to be available [...]
Jue, abr 24, 2014 4:00:00 AM, Continue reading at the source
Leading cities are evolving their transport systems from single modes to integrated ones, improving transport services and providing an improved value proposition to customers. Our study shows how pacesetting cities are applying their leadership and vision to build “smarter” transportation systems. (IBM Institute for Business Value study) [...]
Vie, ago 01, 2014 7:50:57 PM, Continue reading at the source
Cities are gaining more control over their development, but they face challenges and threats to their sustainability. Cities need to put in place smarter systems to seize opportunities to build sustainable prosperity. (IBM Institute for Business Value study) [...]
Vie, ago 01, 2014 7:50:57 PM, Continue reading at the source
Governments can take lessons from segments within the private sector, such as healthcare and financial services, that have successfully implemented new identity management schemes. We have identified three strategies that have contributed to the success of these private programs and that can, we believe, provide practical insights to guide governments. (IBM Institute [...]
Vie, ago 01, 2014 7:50:57 PM, Continue reading at the source
SUBIR