Blogs

 

Most Popular     |      Most Recent

A Conversation About Symantec’s 2015 Internet Security Threat Report

29 Apr, 2015

A Symantec exec breaks down the three main categories of cybersecurity threats. More >

A Milestone Approaches in the Never Ending End of IPv4

21 May, 2015

At some point this summer, ARIN will no longer be able to fulfill requests for IPv4 addresses. But that's not a huge problem if ISPs continue working toward IPv6. More >

Adatao Releases Machine Learning Software Stack

30 Apr, 2015

The Adatao Data Intelligence Platform is a comprehensive software stack that includes a predictive analytics engine and dashboards to query data stored in the platform. More >

All Blogs
Rob Enderle

EMC, U2 and F1 Racing: When Tech and Artistry Collide

Unfiltered Opinion   |  Rob Enderle   |  22 May, 2015

Tech promotion in broad entertainment can be a strong showcase of the technology and proof that the company gets that it isn’t just a man’s world anymore.... More >

0 Comment

Mike Vizard

Applause Automates Testing of Applications

IT Unmasked   |  Mike Vizard   |  22 May, 2015

Rich Weiss, senior product marketing manager for Applause, says Applause Test Automation provides a level of abstraction around the testing scripts an organization develops.... More >

0 Comment

Carl Weinschenk

A Milestone Approaches in the Never Ending End of IPv4

Data and Telecom   |  Carl Weinschenk   |  21 May, 2015

At some point this summer, ARIN will no longer be able to fulfill requests for IPv4 addresses. But that's not a huge problem if ISPs continue working toward IPv6.... More >

0 Comment

Sue Marquette Poremba

Router Vulnerability Highlights IoT Security Risks

Data Security   |  Sue Marquette Poremba   |  21 May, 2015

SEC Consult has identified a vulnerability in NetUSB, which could allow hackers to exploit routers and other IoT devices on the network.... More >

0 Comment

Don Tennant

Channeling Mary Poppins in the Enterprise: Make a Game Out of It

From Under the Rug   |  Don Tennant   |  21 May, 2015

Steve Sims, chief design officer for Badgeville, gives his thoughts on gamification in the enterprise and where he sees it going.... More >

0 Comment

Loraine Lawson

Why Data Services Are Key to Supporting New Tech Trends

Integration   |  Loraine Lawson   |  20 May, 2015

A service approach to data is a key component of a modern technology infrastructure, but data services will require new approaches to data integration.... More >

0 Comment

Arthur Cole

Choosing the Right Private Cloud Platform

Infrastructure   |  Arthur Cole   |  20 May, 2015

The speed at which architectures are evolving requires thorough analysis of where the enterprise is and is going, and the selection of a private cloud should reflect those goals.... More >

0 Comment

Kachina Shaw

Keeping Security Monitoring In-House Becoming Riskier for Some Businesses

Governance and Risk   |  Kachina Shaw   |  19 May, 2015

It has become a question of balance and value, with IT organizations being asked to set up and monitor millions of alerts and identify the most important ones in an instant.... More >

0 Comment

Kim Mays

Mobile Adoption High on SMB List, but Mobile Security Isn’t

SMB Tech   |  Kim Mays   |  19 May, 2015

BYOD may be a convenient and inexpensive way to bring mobile tech to SMBs, but owners must realize that these devices can be dangerous and need high-level protection.... More >

0 Comment

Kim Mays

How Your Enterprise Can Provide High Availability IT Services

New Tools for IT   |  Kim Mays   |  14 May, 2015

Enterprise IT organizations must seriously consider all design aspects of the plan to provide highly available services—not just system infrastructure.... More >

0 Comment

Kachina Shaw

Cybrary, Women in Technology Create Pilot Program for Cybersecurity Skills

Charting Your IT Career   |  Kachina Shaw   |  13 May, 2015

Two professional organizations that are focused on providing technology skills to some underserved and un-reached populations are launching a joint program to help change access to cybersecurity training.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date