Enterprise Apps

Articles

Couchbase Extends Data Reach of Document Database

As document databases mature, it’s becoming apparent that IT needs to manifest all kinds of data large and small via systems of engagement that often are the foundation of a digital business strategy. More >

Syncsort Aims to Drain the Big Data Swamp

It’s not enough to simply dump data into a central repository. An IT organization needs to be able to build a pipeline for managing the flow of data into and out of the lake. More >

Distrust: Is It Time to Rethink Email? Or Throw It Out Altogether?

Anti-phishing needs to be built into email because too many people are being compromised. You need to be able to trust your communications. More >

IBM to Apply Machine Learning Algorithms to Local Data

IBM is pledging to give customers the ability to apply machine learning algorithms to data without requiring them to move data from their local data center into the cloud. More >

Velostrata Helps Pit AWS Against Microsoft Azure

IT wants to be able to extract better pricing options from cloud service providers by being able to deploy existing application workloads based on VMware in either AWS or Azure. More >

Morphisec: Rethinking Endpoint Security

We are badly outmatched in terms of the level, quality and sheer number of attacks our firms get every day, many of which are successful. We need a different class of security tool. More >

More Articles >

Interviews

What It’s Like to Be a ‘Citizen Developer’

Roger Benedict has no IT background, but the owner and president of Ruggs Benedict Carpet One Floor & Home built the apps to run his business with FileMaker, Apple's database and app development platform. He explains how and why.

More >

Days of ‘Demonizing’ Shadow IT Are Behind Us, CIO Says

Despite all the negative headlines associated with the shadow IT phenomenon, it really isn’t a problem, as long as the right relationships are in place.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Making Shadow IT Work for the Enterprise

Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management.

 More >

Intel Outlines Ambitions for Transforming Retail

9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

IT Leaders Need to Be Business Leaders First, CIO Says

IoT’s Growing Pains Put Devices at Risk for Ransomware

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Analytics7 Big Data: Storage, Sharing, and Security

Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solv...

Misc64 Microsoft PowerPoint 2016 Quick Reference

This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and work...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.