More

    Kim Wright

    Explore

    How to Turn BYOD Security Risks to Your Advantage

    Like most IT security risks, one of the greatest concerns of enterprises today can be hard to spot –...

    The Geek Games: The Battle for Last Place

    There is one big difference between a losing athletic team and a losing development team: Nobody remembers the last...

    Five Solutions to Five Application Recovery Challenges

    According to a recent Quest Software survey, organizations now rank restoring critical applications alongside recovering lost data as their...

    Five Best Practices for Securing Private Clouds

    The first reason most IT professionals say they are interested in a private cloud solution rather than a public...

    How to Choose a Cloud Billing Platform

    According to a recent Incyte Group report, nearly half of all businesses in the United States currently have or...

    Social, Mobile, Cloud and Information: The Building Blocks of...

    A nexus of converging forces — social, mobile, cloud and information — is building upon and transforming user behavior...

    Top Nine Google Apps for Security and Compliance

    Google Apps provides a less expensive, Web-based alternative to traditional proprietary software. In addition to the standard Gmail, Calendar...

    How to Ready Your Infrastructure for the Demands of...

    IT professionals know they have to plan today to be ready for the technological demands that will come their...

    10 New Tech Gadgets

    Whether you are on the go, in your office or at home, new technology gadgets can introduce great time-saving...

    Hottest Web-Based Project Management Apps by Google

    Google Apps provides a less expensive, Web-based alternative to traditional proprietary software. In addition to the standard Gmail, Calendar...