Generic

Two-factor authenticatie als onmisbare sleutel in digitale beveiliging

Blog door Peter Volckaert, IT Security Architect. In juni werd Wired-journalist Matt Honan het slachtoffer van hackers. Zij wisten de controle over Honan’s Twitter-account te bemachtigen, door gaten in de beveiliging van Apple, Amazon en Google te benutten. Het uiteindelijke resultaat: ze sloten zijn Gmail-account, verwijderden zijn iCloud-data en maakten misbruik van zijn Twitter-account door […]

Continue reading

6Th Video Blog Extreme Blue Belgium Mentors

After many weeks of working together, Extreme Blue Belgium is coming to an end. The students have already started the prototyping phase.  “They have to choose the technologies they have to work with. Sometimes it is technology they have never worked with so there is a learning process there”- said Hirem Pervaz, Extreme Blue Belgium […]

Continue reading

Smart TV Alliance: TP Vision en IBM bouwen samen aan de televisie van de toekomst

TP Vision, gevestigd in Amsterdam, houdt zich bezig met de ontwikkeling, productie en marketing van alle Philips tv’s in Europa, Latijns-Amerika en Rusland. Het bedrijf is voor 70 procent eigendom van het Chinese TPV en voor 30 procent van het Nederlandse Philips. Het bedrijf is vastbesloten een verschil te maken op de dynamische tv-markt. Daarom […]

Continue reading

Extreme Blue – the 5th week networking session

Extreme Blue teams in Belgium have carried out a networking session at IBM Belgium restaurant. The goal of this session has been, in one hand, to make known Extreme Blue program to other IBMers. Extreme Blue students have tried to explain their project to people who have never heard before about it. On the other […]

Continue reading

Big Data and the festival season: The more data, the better the festival

A blogpost by Patrick Billens In Belgium between June and September more than 400 festivals are organized. Thousands to millions of visitors will crawl the overcrowded streets and squares of our cities to enjoy music, dance, theater and terraces. Think of the Gentse Feesten, Summer of Antwerp or Les Francofolies in Spa. In the media […]

Continue reading

App-explosie bedreiging voor mobiele omgeving

Tijd om afscheid te nemen van defensief beveiligingsbeleid De veiligheid van mobiele apparaten wordt steeds vaker ter discussie gesteld. Niet zelden berichten media over de ontdekking van malware op mobiele apparaten die het ontvreemden van gevoelige informatie zoals bankgegevens mogelijk maakt. Het European Network and Information Security Agency (ENISA) waarschuwt zelfs dat smart devices het […]

Continue reading

Extreme Blue: the third Belgian team

For the last few weeks, the Extreme Blue students have been evaluating ideas. Then, students have narrowed those ideas down into three key concepts. “Narrowing down these ideas has been the most difficult part so far”. Finally, together with the client, they will come up with only one idea that they will build one final […]

Continue reading

Why BYOD security will be up to snuff by 2014

By Marc van Zadelhoff, Vice President, Strategy and Product Management, IBM Security System Here is a bold suggestion: mobile technology actually could be more secure than traditional computing by 2014. While this prediction may seem far-fetched, it’s based on existing security control trends. Companies are adopting best practices that are rapidly enabling mobile computing to […]

Continue reading

Health, Safety and Environment: how does your organization cope with increased complexity?

By Eric Luyer, Market Manager for IBM Asset Management, Industrial Manufacturing Health, Safety and Environment (HSE) activities are a global challenge for every company, regardless of your location – USA, Europe or Asia/Pacific. All over the world there is a growing focus to safeguard the wellbeing of our employees and consumers, but also to keep […]

Continue reading