It goes without saying that if both were running for office, with his level of execution, Tucci would roll over Whitman and likely not even feel the bump. More >
Corralling unstructured data is possible, but it cannot occur if IG decision-makers create policies that drastically impact business user workflow. More >
How do we get more skilled workers and white hats on board to fight the growing number of bad guys out there? More >
Microsoft PowerPoint 2013 is a slide-based presentation software that helps you show your information in a organized, visual manner for easier understanding. More >
At EMC World this week, it occurs to Rob Enderle that it really is sad to see how far HP has fallen. More >
Two examples of Comcast reacting to its new and uncomfortable reality are in Chattanooga and Atlanta. More >
Digital subscriber line (DSL) technology has been on the endangered species list for years.More >
The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.More >
Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.More >
Cybersecurity Ventures recently announced their Q2 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
The IoT will create a ton of information, which is precisely what Big Data is designed to handle.
If you look a little deeper, you'll find a group of lesser-known skills that are gaining momentum and popularity with employers.
Since most standard security measures do not block DNS traffic, cyber criminals are able to infiltrate networks and gain access to proprietary data.More >