Enterprise Apps

Articles

Acronis Employs Heuristics and Blockchain Technologies to Combat Ransomware

Acronis is making it simpler to defeat these attacks by detecting ransomware attacks in real time to enable end users to recover data being affected from an image backup. More >

Gmail Phishing Attack Highlights Need for Multi-Factor Authentication

We should expect more phishing attacks like this, or at least increasingly sophisticated and more difficult to detect. More >

Intel Outlines Ambitions for Transforming Retail

The Intel Responsive Retail Platform (RRP) is an effort by Intel to create what amounts to a reference architecture for Internet of Things (IoT) applications in the retail sector. More >

Making Shadow IT Work for the Enterprise

Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management. More >

Dell EMC Looks to Automate PC Configuration

The ProDeploy Client suite provides three different options for making use of Dell EMC to either simply load images, provide a single point of contact, or support or manage the entire process on their behalf. More >

SAP Aims to Jumpstart IoT Projects

SAP's stated goal is to get organizations down the IoT path faster via a three-month engagement based on a fixed promotional price encompassing both SAP products and services. More >

More Articles >

Interviews

‘Citizen Developers’ Emerge as IT Fails to Keep Pace with Demand for Applications

“Citizen developers,” line-of-business employees with little or no expertise in traditional software development, are helping to relieve IT of the burden of application development.

More >

Lesson for CIOs from Trump Campaign’s Software Strategy: Tap More Data

Michael Fauscette, chief research officer at G2 Crowd, has looked extensively at the software the Trump campaign used, and how its software strategy might have helped Trump win the presidential election.

More >

Silicon Valley Vet Says It Took an Indian Provider to Get CRM Right

What is CRMNEXT, an Indian company, getting right, that U.S. CRM software providers have gotten wrong?

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Concerns Surrounding Identity Security

In all the predictions for 2017, few discuss identity and access issues, but as the line between professional and personal life continues to blur, IAM has to be a higher priority in the coming months.

 More >

IoT Security: Big Trouble in Small Packages

Algorithms Pale to Holistic, Human-Centric Recruiting Approach, Tech CEO Says

CA Technologies Sets Sights on Business Process Automation

Progress Being Made on NFV Interoperability

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Analytics7 Big Data: Storage, Sharing, and Security

Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solv...

Misc64 Microsoft PowerPoint 2016 Quick Reference

This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and work...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.