Blogs

 

Most Popular     |      Most Recent

A Five-Step Strategy for Developing Business-Savvy APIs

06 Oct, 2014

It may be time to rethink how APIs are developed as more established companies use APIs to open up and integrate existing enterprise apps.  More >

A Tale of Two Data Analytics Success Stories

23 Oct, 2014

One company with a bottleneck and one city with a crime problem found success in data analytics projects. More >

A Very Important Spectrum Auction Is on Tap for November

21 Oct, 2014

The Federal Communications Commission is slated on that day to begin taking bids for 1,614 licenses across 65MHz of spectrum. More >

All Blogs
Carl Weinschenk

Speed: The Name of the Networking Game

Data and Telecom   |  Carl Weinschenk   |  24 Oct, 2014

News this week includes G.fast, wireless charging, and artificial intelligence.... More >

0 Comment

Arthur Cole

The Green Data Center: Trying to Hit a Moving Target

Infrastructure   |  Arthur Cole   |  24 Oct, 2014

Great strides can be made in improving the energy consumption-to-data productivity ratio, and that can help to support burgeoning demands for data and data services.... More >

0 Comment

Mike Vizard

NaviSite Adds DRaaS for VMware to Cloud Service

IT Unmasked   |  Mike Vizard   |  24 Oct, 2014

NaviSite, a VMware cloud service provider that is a unit of Time-Warner, unfurled a disaster recovery-as-a-service offering called NaviCloud Director.... More >

0 Comment

Kim Mays

BIOS Protection Guide Helps IT Secure Server Firmware

New Tools for IT   |  Kim Mays   |  23 Oct, 2014

The National Institute of Standards and Technology has created a free document that details computer BIOS security.... More >

0 Comment

Loraine Lawson

A Tale of Two Data Analytics Success Stories

Integration   |  Loraine Lawson   |  23 Oct, 2014

One company with a bottleneck and one city with a crime problem found success in data analytics projects.... More >

0 Comment

Sue Marquette Poremba

Twitter Rethinks Authentication and Access

Data Security   |  Sue Marquette Poremba   |  23 Oct, 2014

Twitter announces the use of Digits, an authentication company, to change the way users log in to the microblogging site.... More >

0 Comment

Don Tennant

Women ‘Need to Be Willing to Try,’ Female Tech CEO Says

From Under the Rug   |  Don Tennant   |  23 Oct, 2014

Revel Systems Co-Founder and CEO Lisa Falzone says she has encountered surprises in hiring good people, dealing with VCs and making herself heard.... More >

0 Comment

Rob Enderle

Windows 10 Moves to Set the Bar for Security

Unfiltered Opinion   |  Rob Enderle   |  22 Oct, 2014

Microsoft has gradually been adding more and more security to its solutions and with Windows 10, it appears to be turning this effort into a major differentiator.... More >

1 Comment

Kachina Shaw

Chamber of Commerce Set to Hold October 28 Cybersecurity Summit

Governance and Risk   |  Kachina Shaw   |  21 Oct, 2014

Heavy hitters from federal agencies, the executive and legislative branches and private enterprise will spend the day discussing the NIST Cybersecurity Framework and other actions.... More >

0 Comment

Kim Mays

International Phone Fraud Causes SMBs to Lose Millions

SMB Tech   |  Kim Mays   |  21 Oct, 2014

Cybercriminals hack into the SMB’s phone systems where they route calls to computers, which can make hundreds of calls at once to premium numbers.... More >

0 Comment

Kachina Shaw

Video Voicemail Aims for Productivity Niche

Charting Your IT Career   |  Kachina Shaw   |  15 Oct, 2014

Big and small players are aiming to provide asynchronous video voicemail/messaging apps, each focusing on different features.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.