<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark</title>
<link>http://www.netvouz.com/lillymark?feed=rss&amp;pg=606</link>
<description>lillymark&#39;s bookmarks on Netvouz</description>
<item><title>How to Manage Security Risk for your Business – Demystify, Understand and Implement!</title>
<link>https://www.egestalt.com/how-to-manage-security-risk-for-your-business-demystify-understand-and-implement.html</link>
<description>Join us for an education webinar on Oct 8, 2013 and Oct 17, 2013 to understand the aspects of conducting security risk analysis for your business – and how to translate the results into terms that make sense in dollars.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 03 Oct 2013 07:48:41 GMT</pubDate>
</item><item><title>How To Maximize Your 2013 Deductions</title>
<link>http://www.mytaxfiler.com/blog/how-to-maximize-your-2013-deductions/</link>
<description>If you want to cut your tax bill next April 15th, start thinking about deductions now. - See more at: http://www.mytaxfiler.com/blog/how-to-maximize-your-2013-deductions/#sthash.L5Il9gmM.dpuf</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 30 Jan 2014 09:51:46 GMT</pubDate>
</item><item><title>How to neutralize vulnerabilities in a mixed cloud on premise environment</title>
<link>http://www.youtube.com/watch?v=JzivT5kDaz0</link>
<description>Modern cloud and on premise applications have become complex collections of Web 2.0 functionality, web services, NoSQL Databases, cloud platforms, technologies, etc. While this has resulted in immense benefits to customers, it has also increased the attack surface for web attackers. 60% of cloud apps are vulnerable and breaches of sensitive enterprise data can include customer information, financial information, healthcare data, etc. Check this video for more information.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 25 Feb 2014 04:37:45 GMT</pubDate>
</item><item><title>How to Neutralize Vulnerabilities in a Mixed Cloud On Premise Environment</title>
<link>http://www.estuate.com/recorded-webinars/how-to-neutralize-vulnerabilities-in-a-mixed-cloud-on-premise-environment</link>
<description>Download this webinar to understand the “back door” threats that are introduced when you bring cloud applications into your organization.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 11 Mar 2014 06:50:08 GMT</pubDate>
</item><item><title>How to neutralize vulnerabilities in a mixed cloud- on premise environment</title>
<link>http://www.estuate.com/events/webinar-in-december-03</link>
<description>Join us for this webinar on Tue, December 03 @ 10AM PST, focusing on How to neutralize vulnerabilities in a mixed cloud- on premise environment.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 02 Dec 2013 11:01:21 GMT</pubDate>
</item><item><title>How to Optimize like a Pro</title>
<link>http://mapusoft.leadformix.net/LPOptimizerArticle2-10-11.html</link>
<description>Embedded software and embedded platforms are all about optimization. These devices are known for their limitations – either memory or storage space or processor speed – and it’s the engineer’s job to make the embedded software application run at its highest performance level. That’s optimization.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 05 Sep 2013 08:34:03 GMT</pubDate>
</item><item><title>How to Overcome Challenges in Application Porting</title>
<link>http://www.slideshare.net/MapuSoft/how-to-overcome-challenges-in-application-porting</link>
<description>Application porting refers to the process of converting original application code to make it compiler and run on a different computing environment from which it was originally designed. In most cases, the changes are not easy to execute when it comes to porting software from one Operating System (OS) to another, or even between versions of a single OS. Porting is usually quicker and cheaper than performing a full code rewrite, whereas, manual porting can turn into a major code-rewrite if the underlying OS platforms are very different.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 03 May 2013 04:23:49 GMT</pubDate>
</item><item><title>How to Own 100% of Your Code</title>
<link>http://www.info.mapusoft.com/sample_how_to_own_your_code.html</link>
<description>Every day new products emerge. Last year alone we had very interesting and exciting technology released in the market Vendors were driven to provide better products which are smaller, smarter and faster than their predecessor.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 15 Mar 2013 06:01:09 GMT</pubDate>
</item><item><title>How to Own 100% of your Products&#39; Code?</title>
<link>http://www.mapusoft.com/wp-content/uploads/documents/own-your-product-code.html</link>
<description>What’s the difference between writing the code and owning it? That will be the question on every reader’s mind once they read this article. Let’s find out how software developers can easily get blind-sided by their own performance initiated thought process while developing a product.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 19 Jun 2013 09:54:27 GMT</pubDate>
</item><item><title>How to Pen-Test Java Applet</title>
<link>http://blog.aujasnetworks.com/pentest-java-applet.html</link>
<description>This article discusses in detail the lesser known art of Pen-Testing Java Applets/Thick Client apps. Here I have explained in detail the process of Pen-Testing Java applets starting from how to go about intercepting data between an Applet and the remote server.</description>
<category domain="http://www.netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 17 Jan 2013 10:15:17 GMT</pubDate>
</item></channel></rss>