February 14, 2014
by Eric Knight, Dirtsearch.orgYou just paid your rent online. The site seems safe and you don’t think twice about a data breach, but is it? As cases of online identity fraud grow, one can never be too careful about freely giving away personal information. Read More >>>
February 13, 2014
by Gil Allouche, QuobleBig data is being used all around us. Most of us are unaware of its influence, but it impacts our lives on a day to day basis. Certain use cases, such as home automation, haven’t been adopted by everyone but are available now. Read More >>>
February 12, 2014
with Mike Brown, BlackberryAnyone who has ever worked from home while waiting for the elusive cable guy, experienced airport weather delays, or been stationed off site at an event knows all too well that a reliable VPN connection is their lifeline for getting work done. Read More >>>
February 7, 2014
IBM today announced strong momentum for its Software-as-a-Service based social business offerings from partners, clients and developers. As part of today’s news, IBM is also highlighting its continued investment with new innovations in its social business and cloud technologies.
February 7, 2014
with Gibu Mathew, ManageEngineIn this interview, Gibu Mathew from ManageEngine outlines the benefits of a cloud-based service that monitors traditional on-premise network, system and application monitoring products. Read More >>>
February 4, 2014
A Softchoice survey of 1,000 full-time people in the United States and Canada found employees who use SaaS apps for work are developing bad tech habits that expose their organizations to security breaches and data loss.
January 27, 2014
by Rick DelGado, Independent AuthorData storage may not sound like a critical component of running a business, but it is actually a major component of the IT infrastructure and can have severe detrimental effects on a company if it is set up poorly. Read More >>>
January 22, 2014
By Dave Eichorn, Zensar Technologies By investing in a multivendor services strategy, organizations can conveniently and cost-effectively source their complex IT infrastructure, allowing them to focus on their core business initiatives through allocating resources toward their bottom line. Read More >>>
January 22, 2014
By Mark Oliver, Group Oliver Today, computers are so prolific that their use is almost ubiquitous to the average user. The increase functions computers are able to perform for both individuals and businesses continues to grow. Read More >>>
January 15, 2014
By Johan Den Haan, Mendix Forward-thinking CIOs and IT leaders are embracing app-fueled innovation as a driver of business growth and differentiation. What they’re realizing, though, is that not all apps are created equal. Read More >>>
January 15, 2014
Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. This is one of many key findings found in the company’s Q4 2013 Global DDoS Attack Report, which was published today and can be downloaded from www.prolexic.com/attackreports.
January 14, 2014
By John Newsom, Dell SoftwareToday, as opposed to physically browsing in stores, consumers are demanding access to more services, from more devices, from any location. As a result, the online experience – and the need to make websites faster and more functional – has become paramount. Read More >>>
January 13, 2014
It is that time of the year again when you sit down, take stock of your IT help desk’s performance these past 12 months and chart a course for success in the new year. Call them New Year’s resolutions, departmental priorities or simply a plan of action; whatever the name, here’s a list of the top five things you could focus on in 2014.
January 13, 2014
with Chris McNabb, DELL BoomiIn this interview, Chris McNabb from Dell Boomi offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile applications. Read More >>>
January 9, 2014
By Carson Sweet, CloudPassageDespite rapid adoption, security remains a top obstacle to successful adoption. Enterprises are sinking a lot of money into addressing these problems – Gartner estimates that cloud security spending will nearly double between 2013 and 2017 with a 28% annual growth rate. Read More >>>
January 9, 2014
SQL Elements provides a broad enterprise-wide view of SQL Server inventory through automated discovery, and gives actionable information about the state of the environment.
January 8, 2014
Before the onslaught of cloud-based services and mobile devices, and the anywhere work-style that followed, IT had complete control over users and IT resources. Everything was Windows-based and provided on site, including PCs and email, file and application servers. And, employees received standard-issue PCs and with controlled access to specific, IT-sanctioned office applications and files.
January 8, 2014
by Rick DelGado, Independent AuthorThere are measures that can be taken to help protect company data in a BYOD atmosphere. This article outlines three strategies that can help. Read More >>>
December 27, 2013
By Jim McCann, Paragon SolutionsTennis fans enjoyed unparalleled degrees of information regarding the matches played, the weather conditions and the players who participated in the U.S. Open thanks in large part to big data implementations.Read More >>>
December 19, 2013
by Gil Allouche, QuobleThink about how much backstory is in just that one statement: what Hadoop is, why Hadoop matters, what the Hadoop ecosystem is, why it matters, what cloud computing is… you get my point. Read More >>>
December 19, 2013
with Bill Ho, President at Biscom In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>
December 18, 2013
As we are leaving 2013, heading for 2014, e-commerce is under heavy expansion. A growing number of online consumers will put pressure on e-commerce sites’ functionality. Web performance expert Sven Hammar, CEO of Apica, gives you his best advice on how to avoid being the e-retailer who throws the customers out on the street in 2014.
December 17, 2013
by Mike Kane, SoftchoiceEnterprise technology is evolving. Adoption of cloud applications such as Evernote and LogMeIn – consumer-grade tools employees depend on for day-to-day productivity – is booming, but as more users embrace these tools, organizations face a perilous double-edged sword. Read More >>>
December 16, 2013
with Mac McConnell, BonitasoftWith the evolution of mobile, big data, packaged apps that utilize BPM, and cloud computing, McConnell stresses the importance of customer facing applications and creative “design” thinking when creating BPM tools. Read More >>>
December 10, 2013
Tangoe, Inc. (NASDAQ: TNGO), a leading global provider of Connection Lifecycle Management (CLM) software and related services, today announced the launch of Matrix, an integrated solution suite comprised of software and services to address the entire lifecycle of an enterprise’s mobile, fixed, machine, cloud, IT and social communications.
December 10, 2013
There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the ability to not just infiltrate multiple OS, but also transfer infection from one platform to another with no trouble at all.
December 10, 2013
By Patrick Burke, RackspaceIBM has patented a solution which it claims is a “green button” that distributes a cloud service to lower power systems to help save environmental costs. Read More >>>
December 9, 2013
Download this white paper and learn how your organization can pursue the deployment of the innovative technologies and applications you need to thrive and protect your assets against all types of cyberthreats.
December 9, 2013
Download this white paper and learn the challenges your firewall is now experiencing with all the new layers of complexity and how to address the situation.
December 4, 2013
By John Pironti, IP ArchitectsAmericans love their electronic devices and the connectivity they provide, as evidenced by the number of Internet-connected devices they own. But a new survey shows that most are struggling with data privacy and security concerns that come with the conveniences of an increasingly always-online lifestyle. Read More >>>