Welcome!


Compliance

Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
Companies are engaging customers and prospects on Facebook, Twitter, LinkedIn, and through blogs and posts on internal or external websites. But are they in compliance with legal requirements related to social media, not to mention privacy? Answering questions on every general counsel...
You've heard the phrase "Knowledge is Power". There seems to be a human character trait that says by keeping documents close at hand, preferably within steps of my office chair, I am more powerful. Filing cabinets for individuals, and "working copies" of client files are everywhere in ...
This article looks at the basic interoperability requirements when communicating with the Cloud, and in particular at techniques and standards used to express and enforce wire-level contracts between communicating parties, as these parties are increasingly also contracting parties in a...
SYS-CON Events announced today that Mark Krzysko, Assistant Deputy Under Secretary of Defense for the US Department of Defense, will be presenting at the upcoming Government IT Conference & Expo (www.GovITExpo.com) this coming October 6th in Washington, DC. The session will be entitled...
ESB products emerged around 2002 from message-oriented middleware (MOM). Faced with market domination by IBM, MOM vendors were the first to jumpstart the ESB concept with the aim of developing a unique selling proposition. They added Web service and EAI capabilities on top of existing ...