Terminal Emulation is still
needed, but it needs to be
EASY to access
Build bridges so you can use all your applications and tools Screenscraping? Actually fun with the right Tools!

Inventu Web Terminal Emulation Blog

Army IT modernization plans could be delayed

Army IT modernization plans could be delayed

Army IT modernization plans could be delayed

Continue Reading
Federal agencies embracing cloud storage services

Federal agencies embracing cloud-based document storage

Federal agencies embracing cloud-based document storage

Continue Reading
A new type of cyber attack capable of exploiting vulnerabilities in Java applications run through SIM cards installed on smartphones has been identified by a mobile security company, according to ZDNet.

New type of SIM card cyberattack exploits Java-based apps

A new type of cyberattack capable of exploiting vulnerabilities in Java applications run through SIM cards installed on smartphones has been identified by a mobile security company, according to ZDNet.

Continue Reading
Technology giant Google and its parent company, Alphabet, Inc. could soon be poised to pay billions of dollars in damages related to its use of Java programming code and a resulting copyright dispute with Oracle Corporation.

Google closer to paying multi-billion-dollar Java API copyright settlement

Technology giant Google and its parent company, Alphabet, Inc. could soon be poised to pay billions of dollars in damages related to its use of Java programming code and a resulting copyright dispute with Oracle Corporation.

Continue Reading
Java's structural flaws have been openly laid bare on multiple occasions. Ineffective patching is typically the root cause of large-scale Java breaches such as these but what if mending porous code is not enough?

Why patching vulnerable Java architecture is not enough

Java’s structural flaws have been openly laid bare on multiple occasions. Ineffective patching is typically the root cause of large-scale Java breaches such as these but what if mending porous code is not enough?

Continue Reading
Keeping an eye on recent notable Java vulnerabilities

Keeping an eye on recent notable Java vulnerabilities

It’s important to always stay on top of new vulnerabilities affecting Java and other open-source programming languages. 

Continue Reading
Understanding the full scope of modern cybersecurity risks

Understanding the full scope of modern cybersecurity risks

Many of our most trusted systems are vulnerable to cyberthreats, and there’s no reason to think the average business is immune. 

Continue Reading
Security issues continue to surround open source development

Security issues continue to surround open source development

Considerable vulnerabilities still exist in the arena of open source software. 

Continue Reading
Major concerns for industrial cybersecurity

Major concerns for industrial cybersecurity

Industrial cybersecurity involves unique challenges for IT personnel.

Continue Reading
New facts emerge regarding CBP data breach

New facts emerge regarding CBP data breach

The data breach that caused CBP border checkpoints to reveal photos of individuals crossing the U.S.-Canada border turned out to be more serious than what was initially reported. 

Continue Reading