

A computer virus spreading beyond Earth to the International Space Station and a hacker intrusion into the Large Hadron Collider computer network illustrate how IT security, or rather a lack of it, can endanger major human undertakings, whether due to human error or negligence, technical failure, or faulty design.
Continue readingA computer virus spreading beyond Earth to the International Space Station and a hacker intrusion into the Large Hadron Collider computer network illustrate how IT security, or rather a lack of it, can endanger major human undertakings, whether due to human error or negligence, technical failure, or faulty design.
Continue readingIDC’s IT Security Roadshow has established itself as a flagship regional event providing a platform for the exchange of ideas, sharing of experience, and discussion on best practices among independent experts, analysts, industry leaders, and users of IT security solutions.
Continue readingThe Comarch CLM loyalty system was granted a certificate of compliance with the PCI-DSS (Payment Card Industry Data Security Standard) and PABP (Payment Application Best Practices) standards during an implementation carried out for a customer in the US.
Continue readingSoftServe, Inc., a leading provider of outsourced software development and consulting services, recently joined the National Outsourcing Association (NOA), Europe’s first Association for effective outsourcing.
Continue readingSoftServe, Inc., a leading provider of outsourced software development and consulting services, recently joined the National Outsourcing Association (NOA), Europe’s first Association for effective outsourcing.
Continue readingCIO Happy Hour portal will be launched as a new questions & answers platform for business people and IT specialists interested in maximizing software solutions value for business.
Continue readingIDC’s IT Security Roadshow has established itself as a flagship regional event providing a platform for the exchange of ideas, sharing of experience, and discussion on best practices among independent experts, analysts, industry leaders, and users of IT security solutions.
Continue readingIt is a one-of-a-kind opportunity to examine how outsourcing and the full spectrum of flexible resourcing solutions such as shared services, offshoring, global talent management, multi-provider, multi-process outsourcing and a whole range of other new management techniques are all coming together to fundamentally transform businesses and economies.
Continue readingOrganizations often miss out on the opportunities an end-of-contract term offers to improve operational and commercial arrangements in an outsourcing relationship.
Continue reading