Blogs

 

Most Popular     |      Most Recent

802.11ac Wave 2 Is a Big Commitment

26 May, 2015

Organizations must keep in mind that the steps between 802.11ac Wave 1 and Wave 2 are big ones that must be undertaken with great care. More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

29 Apr, 2015

A Symantec exec breaks down the three main categories of cybersecurity threats. More >

A Milestone Approaches in the Never Ending End of IPv4

21 May, 2015

At some point this summer, ARIN will no longer be able to fulfill requests for IPv4 addresses. But that's not a huge problem if ISPs continue working toward IPv6. More >

All Blogs
Sue Marquette Poremba

My Reaction When My Personal Information Was Compromised

Data Security   |  Sue Marquette Poremba   |  28 May, 2015

When Sue Poremba's personal information was compromised in a cyberattack on Penn State's networks, she was left with a lot of questions and few answers.... More >

0 Comment

Don Tennant

MacKeeper’s Tarnished Reputation Tip: Convey Your Message, or Others Will Do It for You

From Under the Rug   |  Don Tennant   |  28 May, 2015

Protecting your brand is as important as creating your brand, and it starts at the very beginning with a plan.... More >

0 Comment

Mike Vizard

Lenovo Advances the Mobile Computing Experience

IT Unmasked   |  Mike Vizard   |  28 May, 2015

Lenovo recently announced several innovations that it hopes will bring various technologies to work together seamlessly.... More >

0 Comment

Loraine Lawson

Another Type of Citizen Integrator: The Mobile App User

Integration   |  Loraine Lawson   |  28 May, 2015

Vendors are studying how mobile apps are used and coming up with 'recipes' to help them integrate them without IT's assistance.... More >

0 Comment

Kim Mays

Why SMBs Should Invest in a Mobile Responsive Website

SMB Tech   |  Kim Mays   |  27 May, 2015

SMBs may have a mobile optimized site, but new Google ranking factors show that those without mobile responsive sites have toppled down the ranking lists.... More >

0 Comment

Arthur Cole

What Does the Enterprise Really Want from the Cloud?

Infrastructure   |  Arthur Cole   |  27 May, 2015

For all the hand-wringing, it seems apparent that the cloud will eventually emerge as the dominant form of IT through attrition.... More >

0 Comment

Rob Enderle

Dell vs. HP: What a Difference Five Years Makes

Unfiltered Opinion   |  Rob Enderle   |  27 May, 2015

Rob Enderle says Dell is busting its hump to get ready for tomorrow, while HP is busting its hump to get through today.... More >

0 Comment

Carl Weinschenk

802.11ac Wave 2 Is a Big Commitment

Data and Telecom   |  Carl Weinschenk   |  26 May, 2015

Organizations must keep in mind that the steps between 802.11ac Wave 1 and Wave 2 are big ones that must be undertaken with great care.... More >

0 Comment

Kachina Shaw

Keeping Security Monitoring In-House Becoming Riskier for Some Businesses

Governance and Risk   |  Kachina Shaw   |  19 May, 2015

It has become a question of balance and value, with IT organizations being asked to set up and monitor millions of alerts and identify the most important ones in an instant.... More >

0 Comment

Kim Mays

How Your Enterprise Can Provide High Availability IT Services

New Tools for IT   |  Kim Mays   |  14 May, 2015

Enterprise IT organizations must seriously consider all design aspects of the plan to provide highly available services—not just system infrastructure.... More >

0 Comment

Kachina Shaw

Cybrary, Women in Technology Create Pilot Program for Cybersecurity Skills

Charting Your IT Career   |  Kachina Shaw   |  13 May, 2015

Two professional organizations that are focused on providing technology skills to some underserved and un-reached populations are launching a joint program to help change access to cybersecurity training.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date