In the age of artificial intelligence, nothing new… really?

The year 2017 was marked by numerous issues in the cyber domain. We can mention the successive ransomware waves but also the imminent arrival of the GDPR (General Data Protection Regulation) which is the subject of many conferences, posts, forum topics, etc. Another great subject was the “second birth” of artificial intelligence and machine learning. Concerning the artificial intelligence (AI), we are still far from Skynet from Terminator, I can assure you. However, it has to be said that a… Read More >>

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the European Union. This regulation imposes totally new requirements on how organizations must process such data, which means that companies must step up their efforts in information security management and associated investments. It is important to specify that the regulation (which is already in force, only the application of sanctions is postponed until March 2018) is binding for all companies, European… Read More >>

Feedback on the ANSSI’s qualification of IPdiva Secure, now Systancia Gate

One of the keys to securing the information system of an organization is to deploy security products. Because of their importance in the security system, it is essential to have confidence in these products. Confidence refers to the idea that you can trust someone or something. The best way to measure confidence in a security product is to have a security evaluation, conducted by a recognized and independent body in order to “validate” the response to a specific problem. IPdiva… Read More >>

Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec Information Systems (IS) have developed considerably and are constantly progressing. The Information Systems Security is crucial from an economic and State standpoint, and even from a personal perspective. However, the Information Systems Security is based mainly on its weakest link, which is also the essential element: the human. The administrator who has a power and a very strong responsibility is no exception to… Read More >>

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast that it can sometimes be difficult to grasp all the issues involved. In practice, the Machine Learning can be applied to almost all sectors of activity, whether it is the autonomous driving of vehicles in public spaces or learning from the behavior of users of a company information system. While the most compelling results for the general public are found… Read More >>

The History of Uberization

The usage of the word “uberize” should be a source of endless amusement for contemporary wordsmith. Today, any new product, as long as it’s the slightest bit digital, will be deemed uberized, which at first glance, will immediately terrorize the competitors that brace themselves on archaic methods and create admiration of crowds swooning before such creative daring. Don’t laugh! Soon, term will be so generalized it will be found on our school playgrounds! Imagine that shortly, in the evening, the… Read More >>

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result in a miracle. Launching an IT system into stratospheric orbit remains a complex topic. Of course, if you start with a blank canvas or if you only move forward gradually, the cloud ceiling will be lower, with the propulsion required to breach it consequently less too. Having effective solutions to the key issues of control, management, governance and change management… Read More >>

Will our PCs even exist in 5 years?

Unlike the new generation stepping into the digital era failing to see how upsetting it is for us and the elders to have a mobile phone that essentially allows checking the morning weather forecast in real time without looking out the window, I was constantly amazed by entering the computer age. I remember my first PC. A Philips branded PC. It would have been retrieved in 1985. (sung to an Edith Piaf tune) It was bulging, It was wonderful, appearing… Read More >>

Windows 10 on a connected watch?

As a little kid from the suburbs of Paris, how I loved to gaze at the animated shop windows of the big downtown department stores. It was always a source of enchantment, and it never lost its magic. Later this developed into a fascination for the skills, technical prowess and labor of the nameless artisans and talented creators of the products displayed in the big stores. Just as gazing at the shop window of a talented pastry maker can be… Read More >>

Freed of BYOD, how can you finally make mobility productive?

I BYOD, you BYOD, he BYODs… The world of computing is an inexhaustible source of newly created or reinvented words. Rarely for the better and often for the worse. BYOD (Bring Your Own Device) is one of the latest pipe dreams to come from America. Conceived at the end of the first decade of the 21st century, the concept came about after a presentation by a major American software manufacturer, who demonstrated the technological feat of associating two types of… Read More >>