The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's business environment, multiple organizations must routinely work together in software supply chains when acquiring, developing, operating, and maintaining software products. The programmatic and product complexity inherent in software supply chains increases the risk that defects, vulnerabilities, and malicious code will be inserted into a delivered software product. As a result, effective...
Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are...
The following topics are dealt with : SOA implementation strategy; CRM system; semantic Web services; ERP system; telecom services management; objectionable video classification; software aging state evaluation; task-driven data mining; social-MRC social consensus formation support system; user-driven geospatial Web data; AC-DC boost converter; workflow modeling; customer satisfaction; maritime logistics;...
As outsourcing and expanded use of commercial off-the-shelf (COTS) products increase, supply-chain risk becomes a growing concern for software acquisitions. Supply-chain risks for hardware procurement include manufacturing and delivery disruptions, and the substitution of counterfeit or substandard components. Software supply-chain risks include third-party tampering with a product during development...
Before Sept.11, 2001, the question "what is supply-chain security" would surely have brought out the more traditional areas of risk management-natural and man-made disasters; equipment and infrastructure failures; regulatory requirements; loss prevention; geopolitical events; and personnel strikes. Today, especially after the attacks of Sept. 11, supply chain security has taken on a whole...
As the prosperous development of information technology and Internet, the enterprises change the management of supply chain into modern technology way. Also, the characteristics of information crime has become unremitting confidence , the protection of the invaluable information assets in the supplier chain is facing more rigorous challenges. How can the expensive security mechanism be assessed if...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.