Blogs

 

Most Popular     |      Most Recent

A 5G Timeline Takes Shape

20 Feb, 2015

News this week included 5G, enterprise apps, virtualization's effect on cellular, SDNs and a shift in innovation. More >

A Hybrid Cloud or a Hybrid Data Ecosystem?

10 Feb, 2015

We should focus attention on the fact that the cloud is a secondary consideration to the need to craft real-world solutions to existing challenges. More >

A Serious Look at Third-Party Security

05 Mar, 2015

In so many of the high-profile breaches we’ve seen over the past 18 months, a third-party security breakdown has been, at least partially, to blame. More >

All Blogs
Rob Enderle

Could Intel and a Game Make You a Better Executive?

Unfiltered Opinion   |  Rob Enderle   |  06 Mar, 2015

Nevermind not only showcases some of what is coming in gaming, such as Intel’s RealSense camera, but also the very real benefits of having women contributing in the industry.... More >

0 Comment

Sue Marquette Poremba

A Serious Look at Third-Party Security

Data Security   |  Sue Marquette Poremba   |  05 Mar, 2015

In so many of the high-profile breaches we’ve seen over the past 18 months, a third-party security breakdown has been, at least partially, to blame.... More >

0 Comment

Carl Weinschenk

Tough Times for Tablets: Plenty of Ruggedized Devices Available

Data and Telecom   |  Carl Weinschenk   |  05 Mar, 2015

More tablets used for work are finding their ways into harsh environments; ruggedizing them is very important.... More >

0 Comment

Loraine Lawson

Hybrid Cloud: Why Data Should Come First

Integration   |  Loraine Lawson   |  05 Mar, 2015

The hybrid cloud allows you to leverage the data from legacy infrastructure without modernization.... More >

0 Comment

Mike Vizard

IBM Starts to Blur Line Between the Cloud and Mainframes

IT Unmasked   |  Mike Vizard   |  05 Mar, 2015

IBM is trying to make it easier for IT organizations to bi-directionally invoke mainframe and cloud computing services via a common framework.... More >

0 Comment

Don Tennant

WhatsApp Surge Spotlights Need to Address BYOD Security

From Under the Rug   |  Don Tennant   |  05 Mar, 2015

IT departments need to educate users about the security and privacy risks such apps raise, and provide them with a secure, enterprise-ready alternative.... More >

0 Comment

Arthur Cole

More Options for Multi-Tenant Clouds

Infrastructure   |  Arthur Cole   |  04 Mar, 2015

By earmarking shared infrastructure to key data processes, the cloud becomes more attuned to the needs of the enterprise it serves.... More >

0 Comment

Kim Mays

New Mobile POS System Helps Service-Based SMBs Simplify Payments

SMB Tech   |  Kim Mays   |  03 Mar, 2015

Flint helps small businesses remain flexible in the market by allowing them to accept payments via mobile devices while also providing invoicing, workflow data and service status.... More >

1 Comment

Kim Mays

How Secure Are the Printers and Scanners Within Your Office?

New Tools for IT   |  Kim Mays   |  25 Feb, 2015

Anyone in IT who is responsible for overseeing printers, scanners or fax machines must increase security controls for all such replication devices.... More >

2 Comment

Kachina Shaw

Cybrary.IT Survey Finds Security Training in High Demand

Charting Your IT Career   |  Kachina Shaw   |  18 Feb, 2015

The price of training is a major issue for individuals and companies, as both attempt to keep up with rapidly changing cyber threats and the growing need for specialized security skills.... More >

0 Comment

Kachina Shaw

Encryption Not a Black and White Approach

Governance and Risk   |  Kachina Shaw   |  13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date