Blogs

 

Most Popular     |      Most Recent

A 5G Timeline Takes Shape

20 Feb, 2015

News this week included 5G, enterprise apps, virtualization's effect on cellular, SDNs and a shift in innovation. More >

A Hybrid Cloud or a Hybrid Data Ecosystem?

10 Feb, 2015

We should focus attention on the fact that the cloud is a secondary consideration to the need to craft real-world solutions to existing challenges. More >

Advice for Laid-off IT Pros: Don’t Diminish the Importance of References

20 Feb, 2015

Advice on selecting the right references and understanding what types of questions might be asked of them. More >

All Blogs
Don Tennant

WhatsApp Surge Spotlights Need to Address BYOD Security

From Under the Rug   |  Don Tennant   |  05 Mar, 2015

IT departments need to educate users about the security and privacy risks such apps raise, and provide them with a secure, enterprise-ready alternative.... More >

0 Comment

Mike Vizard

Red Hat Bolsters Support for Containers

IT Unmasked   |  Mike Vizard   |  05 Mar, 2015

Red Hat isn’t the only provider of a Linux distribution that supports containers, but it does have one of the broader lineups of platforms that can be used to deploy them.... More >

0 Comment

Carl Weinschenk

Net Neutrality Is Unlikely to Depress Telecom Investment

Data and Telecom   |  Carl Weinschenk   |  04 Mar, 2015

Subscribers are lining up for services and entrepreneurs are still inventing new products. Dealing with the government a bit more seems unlikely to rain too much on the broadband parade.... More >

0 Comment

Arthur Cole

More Options for Multi-Tenant Clouds

Infrastructure   |  Arthur Cole   |  04 Mar, 2015

By earmarking shared infrastructure to key data processes, the cloud becomes more attuned to the needs of the enterprise it serves.... More >

0 Comment

Kim Mays

New Mobile POS System Helps Service-Based SMBs Simplify Payments

SMB Tech   |  Kim Mays   |  03 Mar, 2015

Flint helps small businesses remain flexible in the market by allowing them to accept payments via mobile devices while also providing invoicing, workflow data and service status.... More >

0 Comment

Loraine Lawson

Hybrid Clouds Mean New API Integration Challenges

Integration   |  Loraine Lawson   |  03 Mar, 2015

While APIs can be part of the problem with hybrid integration, they also are part of hybrid cloud’s potential.... More >

0 Comment

Sue Marquette Poremba

Can Your Company Handle Security Challenges Posed by the Internet of Things?

Data Security   |  Sue Marquette Poremba   |  02 Mar, 2015

It might be time to consider an IoT section to your cybersecurity policy.... More >

1 Comment

Rob Enderle

Windows 10 Is Dead on Mobile? Not So Fast.

Unfiltered Opinion   |  Rob Enderle   |  27 Feb, 2015

The danger here is that making a prediction without enough information can lead to the wrong conclusions.... More >

2 Comment

Kim Mays

How Secure Are the Printers and Scanners Within Your Office?

New Tools for IT   |  Kim Mays   |  25 Feb, 2015

Anyone in IT who is responsible for overseeing printers, scanners or fax machines must increase security controls for all such replication devices.... More >

2 Comment

Kachina Shaw

Cybrary.IT Survey Finds Security Training in High Demand

Charting Your IT Career   |  Kachina Shaw   |  18 Feb, 2015

The price of training is a major issue for individuals and companies, as both attempt to keep up with rapidly changing cyber threats and the growing need for specialized security skills.... More >

0 Comment

Kachina Shaw

Encryption Not a Black and White Approach

Governance and Risk   |  Kachina Shaw   |  13 Feb, 2015

Organizations are being led to believe that encryption is an either-or choice, but that is not the case.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date