Most Popular     |      Most Recent

A Five-Step Strategy for Developing Business-Savvy APIs

06 Oct, 2014

It may be time to rethink how APIs are developed as more established companies use APIs to open up and integrate existing enterprise apps.  More >

A View of iPhone 6, Apple Watch from Down Under

25 Sep, 2014

Australian app development company Appster's CEO gives his views on the latest iPhones and Apple Watch. More >

Actian Makes Free SQL Engine for Hadoop Platform Available

16 Oct, 2014

As familiarity with Hadoop continues to grow in the enterprise, IT organizations are generally deploying Hadoop along two different paths. More >

All Blogs
Arthur Cole

In Search of a Cloud Worthy of the Enterprise

Infrastructure   |  Arthur Cole   |  20 Oct, 2014

Vendors and providers are falling over themselves to tap into the lucrative market for cloud-based infrastructure and application services.... More >

0 Comment

Mike Vizard

Oracle Rises to the Challenge for Metadata Management

IT Unmasked   |  Mike Vizard   |  20 Oct, 2014

Oracle Enterprise Metadata Management 12c aggregates operational metadata to enable organizations to then expose actionable information.... More >

0 Comment

Carl Weinschenk

Google Fiber Signups to Start in December

Data and Telecom   |  Carl Weinschenk   |  17 Oct, 2014

Tech news this week includes HBO streaming service, results of SDN testing, special privacy networks and Google Fiber in Austin.... More >

0 Comment

Loraine Lawson

Emerging Trend: Data Scientist as Humanitarian Worker

Integration   |  Loraine Lawson   |  17 Oct, 2014

Data companies are joining DataKind in providing data scientists to work with organizations to help find efficiencies toward vaccine delivery and poverty eradication.... More >

0 Comment

Kim Mays

Cybersecurity Strategies Integral to Use of Smart Grid Technologies

New Tools for IT   |  Kim Mays   |  16 Oct, 2014

NIST has produced a free report for organizations that rely on smart grid technologies to develop cybersecurity strategies for their systems.... More >

0 Comment

Sue Marquette Poremba

SSL Encryption Bitten by POODLE

Data Security   |  Sue Marquette Poremba   |  16 Oct, 2014

The vulnerability needs to be taken very seriously, but is really a good reminder of the importance of always using smart security practices.... More >

0 Comment

Don Tennant

Prezi May Help Avoid Inflicting ‘Death by PowerPoint’ During Presentations

From Under the Rug   |  Don Tennant   |  16 Oct, 2014

Prezi presentation software allows users to create a zoomable canvas upon which to present their information in more of a story format.... More >

2 Comment

Kim Mays

Increased Use of Digital Tech Makes SMB Employees Struggle with Work/Life Balance

SMB Tech   |  Kim Mays   |  15 Oct, 2014

While many SMB employees gain productivity with new technological advancements, they also lose their sense of time management.... More >

0 Comment

Kachina Shaw

Video Voicemail Aims for Productivity Niche

Charting Your IT Career   |  Kachina Shaw   |  15 Oct, 2014

Big and small players are aiming to provide asynchronous video voicemail/messaging apps, each focusing on different features.... More >

0 Comment

Rob Enderle

BMC Engage Day 2: New Company, Old Name

Unfiltered Opinion   |  Rob Enderle   |  15 Oct, 2014

Day two at the BMC Engage conference showed a whole new side of the now-private company. One that is innovative and with new focus.... More >

0 Comment

Kachina Shaw

Who Will Be Held Responsible for Personal Info Breaches

Governance and Risk   |  Kachina Shaw   |  01 Oct, 2014

What happens with customers in the aftermath of a breach can often be hard to discern, so surveys like this one help companies predict behavior. ... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.