top of page
Quote_1.png
John W. Thompson

"But what Web services suggest is that the connection is always there between an application that is resident somewhere in the cloud, and a user who is somewhere on the other end of a connection."

Standard 
 Customized
"But what Web services suggest is that the connection is always there between an application that is resident somewhere in the cloud, and a user who is somewhere on the other end of a connection."

More 

Quote_1.png
Akshay Vasu

"Love poured out multiplies love poured in."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Soil is earth's barefoot and when we walk barefoot, two barefoot touches each other with love!"

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Once you connect with yourself, it is impossible to be lonely or desperate."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Understanding is the bridge between two minds, love is the bridge between two souls."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"You cannot reach God until you begin to pay attention to humans."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Their hearts, lost in thought, slowly tick away time. When we pass each other on the road, we listen to the rhythm of each other's breathing, and sense the way the other person is ticking away the moments."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Wherever you travel to, I would love to receive a beautiful postcard."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"Think of the times that others remembered your name and used it kindly. How did it make you feel? When you use someone's name it makes him or her feel recognized, appreciated, and special."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"We are not worshipping anyone or anything, we are simply communing with creation."

Author Name

Personal Development

Quote_1.png
Akshay Vasu

"You may not able to hear the song of your heart but the universe can."

Author Name

Personal Development

More 

Quote_1.png
John W. Thompson
"The U.S. and Israel probably lead the way in terms of venture investment in technologies companies focused on the security paradigm. That is quite encouraging."

Encouragement

Quote_1.png
John W. Thompson
"First, I do not think there is any silver bullet to solving the technology side of the security equation."

Technology

Quote_1.png
John W. Thompson
"Well we have a good working relationship with Microsoft at the development level. But let's not kid ourselves, this is a company with enormous resources and talented people, and there is a certain pride that comes along with that for them and for us."

People

Quote_1.png
John W. Thompson
"So you will see us continue to advance the state of the art or take information that we have in our response data bases and have that drive automation or an automated response by some of our products."

Art

Quote_1.png
John W. Thompson
"Right now we have a closure rate between discovery and exploitation of four to six months. We need to be more in the realm of seven to 10 days. That is an enormous challenge."

Challenge

Quote_1.png
John W. Thompson
"Well Web services are nothing more than a way for users to interact with applications."

Nothing

Quote_1.png
John W. Thompson
"But what Web services suggest is that the connection is always there between an application that is resident somewhere in the cloud, and a user who is somewhere on the other end of a connection."

Connection

Quote_1.png
John W. Thompson
"So ensuring the integrity of the data and integrity and validity of the connection is a very important element in any company's strategy that is moving towards a Web service paradigm."

Strategy

Quote_1.png
John W. Thompson
"If you accept that security is a process, and if you can eliminate the human interaction or intervention in that process by automating more, that is a good thing."

Security

Quote_1.png
John W. Thompson
"Second issue is the rapidly accelerating increase in the number of vulnerabilities that get discovered every day. And, equally importantly, is the shortening of time between the discovery of the vulnerability and the release of an exploit."

Time

bottom of page