Underlying both SOA governance and Cloud governance is a fundamental aspect that we have been dealing with ever since the dawn of IT—and that’s the data itself. Let us challenge ourselves with a few questions. Consider them the what, why, when, where, who and how of data governance.
2012 was a big year for security. Congress debated cybersecurity legislation ; social networking site LinkedIn was faulted for one of the largest security breaches in history; and global cyber espionage was a trending topic. On Tuesday, December 11, The Open Group will host a tweet jam examining the topic of IT security and what is in store for 2013.
The device ecosystem is growing faster with the ready availability of gadgets for personal and professional use. The application landscape is on the climb with the addition of Cloud, social, mobile and sensor services. Amongst the most captivating technologies, the Cloud technology stands out.
Earlier this week, we announced our upcoming tweet jam on Tuesday, September 18 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the topic of BYOD and current approaches to managing it. Check out the questions we’ll be asking next Tuesday!
Didn’t catch the walled garden tweet jam? Here is the official summary of the event.
The Open Group will be hosting a tweet jam on Tuesday, July 10 at 9 a.m. PT/12:00 p.m. ET/5:00 p.m. BST. The topic will be on “Facebook walled gardens” and is open to anyone interested in participating through Twitter. Please read on for more details