Blogs

 

Most Popular     |      Most Recent

5 Levels of Data Protection SMBs Should Consider

12 Aug, 2015

Recent reports show that SMBs have embraced digital technologies, but have not yet mastered the provisioning of data security. More >

5 Ways SMBs Benefit from Embracing the Cloud

18 Aug, 2015

When SMBs turn to the cloud, they benefit from more than just having their data kept safe and available. They can cut costs, meet compliance standards and increase data security. More >

5G Set for 2020: Just Around the Corner

01 Sep, 2015

The early (or, arguably, not so early) vendor and carrier activity is not limited to research and development. There also will be efforts to gain favorable position with regulators. More >

All Blogs
Arthur Cole

Defining the ‘A’ in Agile Enterprise Architecture

Infrastructure   |  Arthur Cole   |  04 Sep, 2015

No matter how all this shakes out, the key to success in an architecturally driven enterprise will be to match the application and/or service to the correct architecture, whether it is controlled or dynamic.... More >

0 Comment

Carl Weinschenk

BlackBerry Agrees to Acquire Good Technology

Data and Telecom   |  Carl Weinschenk   |  04 Sep, 2015

This week in tech, BlackBerry to buy out Good Technology, AppLock security app filled with vulnerabilities, and cellphone use on planes still up in the air.... More >

0 Comment

Mike Vizard

HP Advances IT Security Analytics

IT Unmasked   |  Mike Vizard   |  04 Sep, 2015

HP says that, on average, IT organizations receive 17,000 malware alerts per week, resulting in millions of dollars in time and labor being wasted in tracking down false positives.... More >

0 Comment

Kim Mays

Lenovo to Woo SMBs with New Series of Laptops, Desktops

SMB Tech   |  Kim Mays   |  03 Sep, 2015

Lenovo has revealed a new series of laptops and desktops aimed at satisfying the needs and budgets of small to midsize businesses.... More >

1 Comment

Sue Marquette Poremba

DDoS Attacks on the Rise, but Consumers Remain Unaware

Data Security   |  Sue Marquette Poremba   |  03 Sep, 2015

Though they've been around for a long time, DDoS attacks are still coming on strong and we still struggle to find ways to prevent and deal with them.... More >

0 Comment

Don Tennant

Why You Need to Be More Worried About Protecting Your SaaS Data

From Under the Rug   |  Don Tennant   |  03 Sep, 2015

We’d all probably be surprised by how many IT departments, users and executives have failed to fully understand the nuances of proper SaaS data backup and recovery.... More >

0 Comment

Rob Enderle

BMC’s CEO Bob Beauchamp and the Art of a Turnaround

Unfiltered Opinion   |  Rob Enderle   |  02 Sep, 2015

Whether you are buying from, working for, or investing in a firm doing a turnaround, looking for these key elements will help you decide whether you are investing in a viable future or a certain disaster.... More >

1 Comment

Kim Mays

Why All Businesses Need an Emergency Response Plan

New Tools for IT   |  Kim Mays   |  01 Sep, 2015

Every organization should be prepared for an emergency event--be it weather related or otherwise. Having a detailed plan is key to keeping employees and the business safe.... More >

0 Comment

Kachina Shaw

Three Ways to Eliminate Annual Employee Reviews

Charting Your IT Career   |  Kachina Shaw   |  25 Aug, 2015

More companies are making this major change in order to benefit all employees and the bottom line.... More >

0 Comment

Kachina Shaw

End Users Closer to Embracing Change, Giving Up Passwords

Governance and Risk   |  Kachina Shaw   |  15 Jul, 2015

The results of a new survey by Accenture may carry good news for both end users and providers working to maximize their data security and minimize their reliance on passwords.... More >

2 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date