More
    HomeIT Management

    IT Management

    Hedvig Bakes Encryption into Software-Defined Storage Platform

    Data, in theory, should always be secure and universally available. In practice, data ends up being accessible to only...

    Can You Make People Trust the Autonomous Car?

    I just attended an interesting discussion from Intel from Jack Weast, the senior principal engineer and chief systems architect...

    Quick Base Looks to Extend Enterprise Appeal of Online...

    There’s a natural tension between trying to maintain control and security and the need to be a more agile...

    In Microsoft Surface Dust-Up, Consumer Reports Has the Bigger...

    As Consumer Reports is not recommending purchase of Surface laptops and tablets, I want to focus on the need...

    Studies Show Ways Organizations Struggle with Cybersecurity

    A number of recent studies show just how much – and in what manner -- both SMBs and enterprises...

    Digital Transformation: What Lies Ahead

    Everyone wants to know what will happen to the enterprise when the “digital transformation” has run its course. But...

    Pushing Hyperscale to the Extreme

    Hyperscale data centers are pushing a number of extremes, but not all of them are related to sheer size.Increasingly,...

    FCC Shrouds Itself in Secrecy over DDoS Attacks and...

    Last week, if you recall, I wrote about DDoS attacks becoming longer. During my research for that article, I...

    Latest Articles