Blogs

 

Most Popular     |      Most Recent

2nd Watch Enlists New Relic to Help Manage AWS

29 Oct, 2014

As cloud computing continues to evolve, IT organizations should pay careful attention to how pricing models for the delivery of managed IT services are evolving. More >

A Five-Step Strategy for Developing Business-Savvy APIs

06 Oct, 2014

It may be time to rethink how APIs are developed as more established companies use APIs to open up and integrate existing enterprise apps.  More >

A Tale of Two Data Analytics Success Stories

23 Oct, 2014

One company with a bottleneck and one city with a crime problem found success in data analytics projects. More >

All Blogs
Kachina Shaw

Pew: Experts Expect Significant Cyberattack by 2025

Governance and Risk   |  Kachina Shaw   |  29 Oct, 2014

The Pew Research Internet Project collected predictions and thoughts about coming cyberattacks from over 1,600 experts. They are not optimistic.... More >

0 Comment

Kim Mays

Small Business League Crusades to Shut Down 25-Year-Old Government Subcontracting Test Program

SMB Tech   |  Kim Mays   |  29 Oct, 2014

The American Small Business League and others are attempting to fight against the age-old Comprehensive Subcontracting Plan Test Program.... More >

0 Comment

Mike Vizard

2nd Watch Enlists New Relic to Help Manage AWS

IT Unmasked   |  Mike Vizard   |  29 Oct, 2014

As cloud computing continues to evolve, IT organizations should pay careful attention to how pricing models for the delivery of managed IT services are evolving.... More >

0 Comment

Loraine Lawson

In the Future, We’ll All Be Data Geeks

Integration   |  Loraine Lawson   |  29 Oct, 2014

An SAP survey revealed some interesting numbers about data and its future in the business world.... More >

0 Comment

Arthur Cole

The Right Way to Do the Hybrid Cloud

Infrastructure   |  Arthur Cole   |  29 Oct, 2014

Keeping the focus on solutions rather than technology is the best way to get past the public vs. private vs. hybrid quagmire.... More >

0 Comment

Carl Weinschenk

With Lollipop, Android Tries to Lick Its Security Problems

Data and Telecom   |  Carl Weinschenk   |  29 Oct, 2014

Emotions are running high in arguments for and against the strength of Lollipop's security features.... More >

0 Comment

Rob Enderle

The ‘Black Box’ Era of IT

Unfiltered Opinion   |  Rob Enderle   |  29 Oct, 2014

With a black box approach, the solution is held to a set of required performance requirements and the vendor sweats the small stuff, not the buyer.... More >

0 Comment

Don Tennant

New Layers of Gender Inequity Surface in Tech Sector, Research Finds

From Under the Rug   |  Don Tennant   |  29 Oct, 2014

A report from Catalyst shows an even more surprising picture of the challenges women face working in the tech sector.... More >

0 Comment

Sue Marquette Poremba

Threats Increase, but Security Planning Falls Behind

Data Security   |  Sue Marquette Poremba   |  29 Oct, 2014

One of the most disconcerting facts about the state of cybersecurity on the business front came via a Software Advice study.... More >

0 Comment

Kachina Shaw

IT Professionals Frustrated by Lack of Advancement

Charting Your IT Career   |  Kachina Shaw   |  24 Oct, 2014

Robert Half Technology asked IT professionals what caused them the most on-the-job frustration.... More >

0 Comment

Kim Mays

BIOS Protection Guide Helps IT Secure Server Firmware

New Tools for IT   |  Kim Mays   |  23 Oct, 2014

The National Institute of Standards and Technology has created a free document that details computer BIOS security.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Close
Thanks for your registration, follow us on our social networks to keep up-to-date