This technology isn't "bleeding edge" anymore. Now, it's solving real business problems.
Written by Pat Botz
It may surprise you to learn that IBM i shops are beginning to exploit biometric authentication. But it's true. Even though many people still believe that biometric authentication is "bleeding edge" technology, your compatriots in the IBM i world are successfully implementing it.
Is the cloud a security storm waiting to unleash its fury or sunny skies that will make you relax and relinquish all of your security cares? The recent breach of the Sony PlayStation Network created headlines, and when the dust settled, it turned out to be the second-largest online data breach in U.S. history. The fact that the attack on Sony was launched from a "public cloud" brings into question the security policies and reporting of cloud vendors.