Remove 2010 Remove Enterprise Remove Hardware
article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO

Around the turn of the century, Autonomy Corporation was one of the darlings of the UK technology industry, specializing in knowledge management and enterprise search. Rather than selling software to customers, HP said, Autonomy had been selling them hardware at a loss, then booking the sales as software licensing revenue.

article thumbnail

3 Cybersecurity Technologies You Should Know

The Crazy Programmer

Forrester Research analyst John Kindervag coined the term “zero trust” in 2010 because, at the time, the concept of trustworthy internal networks and untrusted external networks was seen as flawed. Whether you’re downloading files or simply browsing, it can be a very useful bit of software. Zero Trust.

article thumbnail

A Practical History of the Firewall – Part 4: The Next Generation

Firemon

The Next-Generation Firewall Market Penetration of the Next-Gen Firewall The Platform The Future of the Firewall Book a Demo Jody Brazil CEO at FireMon As hardware and software performance improved, the difference in firewall performance between the different vendors became much smaller. A very impressive track record.

article thumbnail

A Practical History of the Firewall – Part 4: The Next Generation

Firemon

The Next-Generation Firewall Market Penetration of the Next-Gen Firewall The Platform The Future of the Firewall Book a Demo Jody Brazil CEO at FireMon As hardware and software performance improved, the difference in firewall performance between the different vendors became much smaller. A very impressive track record.

article thumbnail

The Role of Cloud Migration in Digital Transformation

RapidValue

Many enterprises move their applications and data to the cloud to avoid the need to build and maintain an on premise infrastructure. Gartner published the “5 Rs” model as far back as 2010, which defined all the options available to migrate a specific application to the cloud. Moving to the cloud meant easy data back-up and recovery.

Cloud 98
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

CVE-2010-2568: Windows Shell Remote Code Execution Vulnerability Remote Code Execution Exploited Zero-Day Local Stuxnet High 2010 Why it’s significant: Regarded as one of the most sophisticated cyberespionage tools ever created, Stuxnet was designed to target SCADA systems in industrial environments to reportedly sabotage Iran's nuclear program.

article thumbnail

When I Work, a messaging app that lets shift-based teams schedule work and more, raises $200M

TechCrunch

Founded in Minneapolis in 2010, When I Work says its app is already used by some some 10 million hourly workers in the U.S. across some 200,000 businesses, with a focus on smaller businesses and franchises of well-known names (the list includes Dunkin’, Ace Hardware, Ben & Jerry’s and Kenneth Cole).

Software 185