Cougias, Dorian
July 2005
Hospitality Upgrade;Summer2005, p34
Trade Publication
Focuses on the responsibility of the hospitality information technology community in taking effort to improve security regulations and standards. Variety of programming methodologies and backgrounds; Definition of information security requirements before looking for a computer vendor; Management make a forward decision whether the benefits of the new system outweigh the costs of controls.


Related Articles

  • MAI Canada, Ltd.  // Hospitality Upgrade;Summer2004, p64 

    Provides information on Richmond Hill, Ontario-based MAI Canada Ltd., a supplier of software, hardware, training and support and consulting and networking facilities to the hospitality market. Installation of product suites in a variety of properties across Canada; Clients of the company...

  • Features. Flinders, Karl // MicroScope;4/2/2007, p29 

    The article looks at the evolution of the Unified Threat Management (UTM) products market. The UTM sector has evolved beyond recognition, to a point that broad security and large enterprise vendors and channel players are focusing on it. Mid market and corporate businesses are buying UTM...

  • Enterprising Solutions. Hawser, Anita // Global Finance;Feb2006, Vol. 20 Issue 2, p24 

    The article reports on the development of financing techniques by software companies in efforts to provide high-end systems' access to smaller companies. Software subscription models, or pay-as-you-use financing has emerged and has been proven to reduce upfront project and infrastructure costs,...

  • 2012 Forecast For The Global Software and IT Services Market.  // Software World;Mar2012, Vol. 43 Issue 2, p5 

    The article focuses on the forecast on the performance of the global software and information technology (IT) services worldwide. It anticipates that the significant economic disparities in European countries and other regions such as the U.S., Africa, and Asia Pacific (APC) will result to a...

  • BUILDING SOFTWARE? CURB YOUR ENTHUSIASM. Strassmann, Paul A. // Baseline;Mar2007, Issue 70, p26 

    The author focuses on the proliferation of new software development projects. The disadvantages of starting new small projects instead of enhancing the existing software applications is discussed. Testing and fixing bugs in large applications, which increases the capacity of programmers and cost...

  • Faulty software a big risk to business. Flinders, Karl // Computer Weekly;12/20/2011, p5 

    The article discusses the potential risk of faulty software to the information technology (IT) industry as well as its potential damage to users. Bill Curtis, chief scientist at Cast, states that 35% of the violations found in a study would result in damage to business by affecting the security,...

  • Keeping ahead of advancing threats requires an intelligent team effort. Ashford, Warwick // Computer Weekly;3/13/2012, p4 

    The article presents information on the software corporation Microsoft's discussion of information technology (IT) security and security strategies against malware. Topics include the relevancy of the Microsoft Trustworthy Computing program, the evolution of security strategies, and...

  • What's your SaaS plan B? Leigh, Jon // Data Strategy;Aug2009, Vol. 6 Issue 8, p13 

    The author offers insights into the issues businesses should consider before deploying Software as a Service (SAAS) technology. He cites the failure of many companies to consider ongoing availability of SaaS and how they would recover in case this application is compromised and become...

  • Worlds without frontiers. Condon, Ron // SC Magazine: For IT Security Professionals;Mar2004, p20 

    The article highlights the promotion of open standards to enable a secure and boundaryless information flow across organizations by the Jericho Forum as of March 2004. Led by security bosses at organizations such as BP, Royal Mail, BBC, and ICI, they have come together to form the Jericho...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics