Blogs

 

Most Popular     |      Most Recent

A Three-Step Strategy for Tackling Big Data Governance Challenges

28 Jan, 2015

Matching steps toward success with the data governance challenges of Big Data. More >

A10 Networks Turns ADC into Cloud Operating System

20 Jan, 2015

As IT organizations move to deploy ADCs from A10 Networks on premise and in the cloud, a federated ability to manage distributed IT resources starts to emerge. More >

Acquia Adds VPN to Drupal SaaS Service

23 Jan, 2015

Acquia provides a turnkey cloud platform that gives the IT organization the proverbial one throat to choke in terms of who is responsible for maintaining all aspects of the service. More >

All Blogs
Mike Vizard

IBM Tests Identity Mixer Encryption Service to Secure Data

IT Unmasked   |  Mike Vizard   |  29 Jan, 2015

With IBM's new encryption technology, users will have a set of encrypted credentials that are verified by Identity Mixer without needing to provide address or credit card info.... More >

0 Comment

Don Tennant

UK Provider Brings Hybrid Cloud Subscription Service to U.S. Market

From Under the Rug   |  Don Tennant   |  29 Jan, 2015

Zynstra offers a 'lifeline' to SMBs ahead of Windows Server 2003 end of support.... More >

0 Comment

Kim Mays

Digital Project Managers: Liaisons of Organization, Even in the Cloud

New Tools for IT   |  Kim Mays   |  28 Jan, 2015

To hire a digital PM, a company may repurpose a job description for a regular project manager. However, they may need to consider the additional needs the role requires.... More >

0 Comment

Loraine Lawson

A Three-Step Strategy for Tackling Big Data Governance Challenges

Integration   |  Loraine Lawson   |  28 Jan, 2015

Matching steps toward success with the data governance challenges of Big Data.... More >

0 Comment

Carl Weinschenk

Google Fiber Proves the Skeptics Wrong and Wireless May Be Next

Data and Telecom   |  Carl Weinschenk   |  28 Jan, 2015

Google Fiber announces that its service will be coming to 18 cities in four major metropolitan areas including Atlanta, Nashville and Charlotte.... More >

0 Comment

Arthur Cole

Sorting Out the Container’s Place in the Enterprise

Infrastructure   |  Arthur Cole   |  28 Jan, 2015

A high degree of confusion surrounds the capabilities and role of containers in emerging data architectures.... More >

0 Comment

Sue Marquette Poremba

Make National Data Privacy Day a Priority

Data Security   |  Sue Marquette Poremba   |  28 Jan, 2015

National Data Privacy Day is meant to encourage better privacy and security practices when using our multitudes of devices.... More >

0 Comment

Rob Enderle

BMC-CDB Merger: The Magic Is in the Process

Unfiltered Opinion   |  Rob Enderle   |  28 Jan, 2015

All mergers are not alike. BMC didn't buy the company in its acquisition of CDB. It bought the assets and hired some of the people. That makes a world of difference.... More >

0 Comment

Kim Mays

New IT Model a Good Fit for SMBs

SMB Tech   |  Kim Mays   |  26 Jan, 2015

As the world becomes more and more reliant on data as a big factor for growth, it’s no doubt that smaller businesses will see the need to adopt emerging technologies.... More >

0 Comment

Kachina Shaw

Cybrary.IT Aims to Break Down Barriers to Entry to Cybersecurity Training

Charting Your IT Career   |  Kachina Shaw   |  26 Jan, 2015

Cybrary.IT Co-Founder Ryan Corey has identified several groups that will benefit from access to free cybersecurity training. Some lack funds, some need flexibility.... More >

0 Comment

Kachina Shaw

Heartland Protects Merchant Customers with Breach Warranty

Governance and Risk   |  Kachina Shaw   |  12 Jan, 2015

Small businesses may start to see more warranty products offered like Heartland's Heartland Secure.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date