Related Content
Internet Explorer Updates Help Attract Developers and Consumers Competitors have continued to show initiative to innovate, but a fresh update for Internet Explorer 11 has patched twenty-five of the browser’s key vulnerabilities and even added new tools to entice additional developers. Microsoft is making big moves in the browser game. |
||
Finger Vein Biometric Authentication Comes to Banking Barclays, a global banking company based in London, has announced that next year the bank will begin offering its corporate banking customers a new biometric security technology that uses finger vein authentication, eliminating the need for PINs and passcodes. |
||
Who Should Be Testing? New Considerations after Security Breaches Debates arise when people start talking about where a particular IT function should be performed. Executives can act as if testing is a necessary evil and cost is the only important factor. But due to recent security breaches, companies should be more concerned with comprehensive testing than cost. |
||
US Citizenship and Immigration Services Adopting Agile The US Citizenship and Immigration Services, which is the Department of Homeland Security agency meant to oversee lawful immigration, is aiming to automate the integration and delivery of its software projects with a new, paperless immigration system that makes use of agile practices. |
||
China Challenging Google and Microsoft in OS War Thanks to a lack of trust in the United States' surveillance policies, China hopes to replace massively popular properties such as Windows and Android as the leading OS in the country, both on mobile and desktop devices. The current target date for release is October. |
||
Tapping into the Power of Introverts in IT Introverts—those who rarely talk to others, seldom engage socially, and answer questions only when asked—can be the strongest contributors on a team, but only if they’re engaged effectively. Here are some tactics that can help leverage the enormous strengths of the quiet ones on your team. |
||
Doing Our Part to Contain Point-of-Sale Data Theft It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks. |
||
EMV—The Next Generation of Credit Card Security According to the US Department of Justice, approximately 16.6 million people, or 7 percent of all US residents age sixteen or older, were victims of at least one incident of identity theft in 2012. Beth Cohen looks at EMV cards—the next generation of credit card security. |