PAS - Plan D'Assurance Sécurité

PAM should not exclude SAP

Before starting to play a board game, it’s customary to read the game rules. As part of an outsourcing service,...

Read

The Cleanroom concept for a safe and secure administration

A bastion is a military structure projecting outward from the wall of a fortress. In computer science, we can extrapolate…

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast…

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result…

Will our PCs even exist in 5 years?

Unlike the new generation stepping into the digital era failing to see how upsetting it is for us and the…

Windows 10 on a connected watch?

As a little kid from the suburbs of Paris, how I loved to gaze at the animated shop windows of…

Freed of BYOD, how can you finally make mobility productive?

I BYOD, you BYOD, he BYODs… The world of computing is an inexhaustible source of newly created or reinvented words….

Virtualization and security in the courtroom

The courtroom barely holds a multicolored crowd comprising the media, professionals, practitioners and onlookers with a vivid opinion about everything….

Acropolis, Greece has the honor!

What a tough job it is being a technology analyst. With every day spent in front of a blank page,…

In the interest of virtualizing the health sector

Everyone has their own obsession. One of these that made me famous (well, at least only in the family) is…