Accessing native mobile device functions in IBM Worklight using Apache Cordova
Introduction
In this blog we provide an overview of advantages…
Secure Mobile Access using Ping Federate OAuth server
Introduction:
This blog briefs how Ping Identity OAuth server…
Cloud Security : Nexright in news
The cloud security industry has been rocked by a near-constant…
Web Single Sign-On using Windows Azure Access Control Service
What is ACS?
Access Control Service, or Windows Azure AppFabric…
OAuth 2.0 implementation using IBM Cast Iron
OAuth 2.0 is the next evolution of the OAuth protocol and it…
OAuth - Cast Iron Implementation
Brief introduction to the OAuth 1.0 (based on oauth.net Oauth…
How enterprises are closing the final gap in efficient operations
There’s a paradox at the heart of how a modern business uses…
Running Services on AWS “Cookbook”
In order to start deploying your Solutions you should:
Pick…
Shared Contacts tool for Google Apps
A simple tool to manage your Shared Contacts for Google Apps…
Parlez-vous le Cloud Computing? RunMyProcess Does
RunMyProcess (RMP), the Cloud-based business process management…
Gartner Reveals Four Identity &(IAM); Access Management Predictions for 2009 and Beyond
By 2011, hosted IAM and IAM as a service will account for 20…
Why Google Apps
Based on recent growth and cost trends, google apps email and…