Blogs

 

Most Popular     |      Most Recent

A Three-Step Strategy for Tackling Big Data Governance Challenges

28 Jan, 2015

Matching steps toward success with the data governance challenges of Big Data. More >

A10 Networks Turns ADC into Cloud Operating System

20 Jan, 2015

As IT organizations move to deploy ADCs from A10 Networks on premise and in the cloud, a federated ability to manage distributed IT resources starts to emerge. More >

Acquia Adds VPN to Drupal SaaS Service

23 Jan, 2015

Acquia provides a turnkey cloud platform that gives the IT organization the proverbial one throat to choke in terms of who is responsible for maintaining all aspects of the service. More >

All Blogs
Kim Mays

Small Businesses Encouraged to ‘Take the Pledge’ to Get Educated on Cybersecurity

SMB Tech   |  Kim Mays   |  30 Jan, 2015

Small business evangelist Ramon Ray and Norton encourage SMBs to improve their cybersecurity efforts for 2015.... More >

0 Comment

Loraine Lawson

The Essential Questions Data Governance Teams Must Answer

Integration   |  Loraine Lawson   |  30 Jan, 2015

There are five important points that make for an excellent discussion list for data governance committees.... More >

0 Comment

Carl Weinschenk

Rising Apple Catches Slumping Samsung

Data and Telecom   |  Carl Weinschenk   |  30 Jan, 2015

News this week included 100G Metro, IoT security, the Obama administration on data usage, Apple vs. Samsung and Microsoft's HoloLens innovations.... More >

0 Comment

Arthur Cole

DCIM and the Scaled-Out Data Center

Infrastructure   |  Arthur Cole   |  30 Jan, 2015

DCIM will remain a significant undertaking for the enterprise because it incorporates not just the data side of infrastructure but the facilities side as well.... More >

0 Comment

Mike Vizard

Hortonworks Launches Hadoop Data Governance Initiative

IT Unmasked   |  Mike Vizard   |  30 Jan, 2015

DGI will create a customizable metadata framework on top of Hadoop that IT organizations will be able to invoke using a rules-based policy engine.... More >

0 Comment

Sue Marquette Poremba

The Ongoing Trouble with Passwords

Data Security   |  Sue Marquette Poremba   |  29 Jan, 2015

It's not just the bad passwords, it's the reuse of the same passwords that makes networks vulnerable.... More >

0 Comment

Don Tennant

UK Provider Brings Hybrid Cloud Subscription Service to U.S. Market

From Under the Rug   |  Don Tennant   |  29 Jan, 2015

Zynstra offers a 'lifeline' to SMBs ahead of Windows Server 2003 end of support.... More >

0 Comment

Kim Mays

Digital Project Managers: Liaisons of Organization, Even in the Cloud

New Tools for IT   |  Kim Mays   |  28 Jan, 2015

To hire a digital PM, a company may repurpose a job description for a regular project manager. However, they may need to consider the additional needs the role requires.... More >

0 Comment

Rob Enderle

BMC-CDB Merger: The Magic Is in the Process

Unfiltered Opinion   |  Rob Enderle   |  28 Jan, 2015

All mergers are not alike. BMC didn't buy the company in its acquisition of CDB. It bought the assets and hired some of the people. That makes a world of difference.... More >

1 Comment

Kachina Shaw

Cybrary.IT Aims to Break Down Barriers to Entry to Cybersecurity Training

Charting Your IT Career   |  Kachina Shaw   |  26 Jan, 2015

Cybrary.IT Co-Founder Ryan Corey has identified several groups that will benefit from access to free cybersecurity training. Some lack funds, some need flexibility.... More >

0 Comment

Kachina Shaw

Heartland Protects Merchant Customers with Breach Warranty

Governance and Risk   |  Kachina Shaw   |  12 Jan, 2015

Small businesses may start to see more warranty products offered like Heartland's Heartland Secure.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date