dcsimg

Slideshows - Article Archives - Page 1

How the Gig Economy Is Changing the Tech Industry

October 27, 2017 |

The gig economy is clearly disrupting the tech industry, both in positive and negative ways.

READ MORE

10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

October 26, 2017 |

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations.

READ MORE

IIoT Gaining Momentum in Adoption and Results

October 19, 2017 |

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors.

READ MORE

Ten New Technologies Transforming the Classroom

September 27, 2017 |

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences.

READ MORE

How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

September 20, 2017 |

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises.

READ MORE

PAM Solutions: Critical to Securing Privileged Access

August 25, 2017 |

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution.

READ MORE

How Can We Fix the Fake News Problem?

August 24, 2017 |

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links.

READ MORE

The World According to Blockchain

August 09, 2017 |

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain.

READ MORE

IoT: Top 7 Challenges

July 19, 2017 |

The IoT represents a unique set of challenges that pose a real threat to its utility as an engine of economic growth. Fortunately, the problems encountered so far are solvable, although it will probably take some time to determine exactly how to handle them and what level of optimization is needed for the multiple IoT services that are certain to arise.

READ MORE

Biometrics: Moving Far Beyond Fingerprints

June 28, 2017 |

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future.

READ MORE

How Bots Are Going to Work to Increase Efficiency

June 20, 2017 |

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting.

READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

April 26, 2017 |

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions.

READ MORE

Security Pros Give Their Opinions on ISP Data Privacy Rollback

April 26, 2017 |

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say.

READ MORE

How and Why Companies Are Incorporating the Power of IBM Watson

March 31, 2017 |

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services.

READ MORE

How Wearable Devices Are Creating Innovation in the Workplace

March 28, 2017 |

Wearables are revolutionizing the workplace, with innovations that create a safer work environment or enhance the way professionals are able to go about their job.

READ MORE

7 Top Skills for Security Pros

February 27, 2017 |

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you.

READ MORE

The Most In-Demand Security Jobs and How to Get Them

January 31, 2017 |

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths.

READ MORE

9 Predictions for Cybersecurity's Role in Government and Politics in 2017

January 17, 2017 |

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017.

READ MORE

How Risky Behaviors Hurt Shadow IT Security

December 12, 2016 |

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices.

READ MORE

Ransomware: The Rising Face of Cybercrime

November 04, 2016 |

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year.

READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS