Author user photo

Who Has a Copy of Your Software?

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

The Sand Hill 25 Bitcoin Innovative Disrupters

This list represents the first wave of companies leveraging blockchain-related technologies that will play a pivotal role in the future.

More Articles

News You Can Use

Click here for news about:

  • Big data and financial analytics award
  • IBM's new Cloud Security Enforcer for "bring your own cloud apps" at work
  • 1st visual search-based analytics platform for retailers