Blogs

 

Most Popular     |      Most Recent

A 5G Timeline Takes Shape

20 Feb, 2015

News this week included 5G, enterprise apps, virtualization's effect on cellular, SDNs and a shift in innovation. More >

A Hybrid Cloud or a Hybrid Data Ecosystem?

10 Feb, 2015

We should focus attention on the fact that the cloud is a secondary consideration to the need to craft real-world solutions to existing challenges. More >

Advice for Laid-off IT Pros: Don’t Diminish the Importance of References

20 Feb, 2015

Advice on selecting the right references and understanding what types of questions might be asked of them. More >

All Blogs
Loraine Lawson

Informatica, Capgemini, Pivotal Partnership Offers Data Lake Jump Start

Integration   |  Loraine Lawson   |  27 Feb, 2015

It promises a real-time, unified approach to information management that acts like 'search in a box.'... More >

0 Comment

Carl Weinschenk

Big Week at the FCC: New Net Neutrality Rules, Power to the Munis

Data and Telecom   |  Carl Weinschenk   |  27 Feb, 2015

News this week included net neutrality, municipal broadband, iOS and Android (near) total dominance, dire mobile app security and super-fast wireless.... More >

0 Comment

Arthur Cole

DAS Rules in Hyperscale, For Now

Infrastructure   |  Arthur Cole   |  27 Feb, 2015

No matter how you arrange your storage in scale-out environments, the key element will be adequate networking.... More >

0 Comment

Mike Vizard

Corvil Simplifies Network Analytics

IT Unmasked   |  Mike Vizard   |  27 Feb, 2015

Corvil CEO Donal Byrne notes that organizations are looking for ways to cost effectively get at raw data moving across their networks at high speeds.... More >

0 Comment

Don Tennant

The Importance of Inserting ‘Small Data’ into the Big Data Discussion

From Under the Rug   |  Don Tennant   |  27 Feb, 2015

Small data, such as CRM data, is a decision-making starting point, says a Preact exec.... More >

0 Comment

Sue Marquette Poremba

CEOs Talk Better Cybersecurity, but Are Disconnected from Security Efforts In-House

Data Security   |  Sue Marquette Poremba   |  26 Feb, 2015

Corporate leaders publicly agree that cybersecurity is a top priority for business, but recent studies prove that most CEOs don't understand how it works.... More >

0 Comment

Kim Mays

How Secure Are the Printers and Scanners Within Your Office?

New Tools for IT   |  Kim Mays   |  25 Feb, 2015

Anyone in IT who is responsible for overseeing printers, scanners or fax machines must increase security controls for all such replication devices.... More >

0 Comment

Kim Mays

SMBs Still Need Guidance for ACA, SBA Sets Up Online Info

SMB Tech   |  Kim Mays   |  23 Feb, 2015

For SMBs that still need help making their way through the complexities of the ACA, the Small Business Association has set up its own Health Care area on its website.... More >

0 Comment

Kachina Shaw

Cybrary.IT Survey Finds Security Training in High Demand

Charting Your IT Career   |  Kachina Shaw   |  18 Feb, 2015

The price of training is a major issue for individuals and companies, as both attempt to keep up with rapidly changing cyber threats and the growing need for specialized security skills.... More >

0 Comment

Kachina Shaw

Encryption Not a Black and White Approach

Governance and Risk   |  Kachina Shaw   |  13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date