Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec Information Systems (IS) have developed considerably and are constantly progressing. The Information Systems Security is crucial from an economic and State standpoint, and even from a personal perspective. However, the Information Systems Security is based mainly on its weakest link, which is also the essential element: the human. The administrator who has a power and a very strong responsibility is no exception to… Read More >>

Of Machine Learning and Application Virtualization

Machine Learning is nowadays one of the most common expressions in literature, but the fields of application are so vast that it can sometimes be difficult to grasp all the issues involved. In practice, the Machine Learning can be applied to almost all sectors of activity, whether it is the autonomous driving of vehicles in public spaces or learning from the behavior of users of a company information system. While the most compelling results for the general public are found… Read More >>

Cloudifying the uncloudifiable!

“My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result in a miracle. Launching an IT system into stratospheric orbit remains a complex topic. Of course, if you start with a blank canvas or if you only move forward gradually, the cloud ceiling will be lower, with the propulsion required to breach it consequently less too. Having effective solutions to the key issues of control, management, governance and change management… Read More >>