Migrating Real-Life Enterprise ‘Ultra-Legacy’ Systems (Guest Post)
- — Dec. 1, 2012, 11:30 p.m.
Sometimes the posts I write inspire others to write ones that are even better based on their personal experiences - this is one of those blog posts! Tero Hanninen has been involved in migrating one of those ultra-legacy systems for a few years, and it turns out his process reads like a horror novel for IT people. Heed the lesson, learn from his experience - and enjoy one of my favorite (to date) reader contributions ... thank you to Tero for his fantastic contribution!Read the full article
Sign up now »
RSA offers a wide range of strong two-factor authentication solutions to help organizations assure user identities and meet compliance requirements.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.