les dangers du social login

The risks of Social Login

You have seen it before, or even already used it to connect to a website, the social login seduces because...

Read

In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but…

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the…

Feedback on the ANSSI’s qualification of IPdiva Secure

One of the keys to securing the information system of an organization is to deploy security products. Because of their…

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast…

The History of Uberization

The usage of the word “uberize” should be a source of endless amusement for contemporary wordsmith. Today, any new product,…

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result…

Will our PCs even exist in 5 years?

Unlike the new generation stepping into the digital era failing to see how upsetting it is for us and the…

Windows 10 on a connected watch?

As a little kid from the suburbs of Paris, how I loved to gaze at the animated shop windows of…

Freed of BYOD, how can you finally make mobility productive?

I BYOD, you BYOD, he BYODs… The world of computing is an inexhaustible source of newly created or reinvented words….