December 4, 2014
by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>
December 3, 2014
by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>
December 3, 2014
with Jerry Melnick, SIOS TechnologyIn this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach. Read More >>>
December 3, 2014
By Arvind Parthiban, ManageEngineHiring people for a service desk is a major challenge but an important one. Without good people, even the best processes and tools will fail to deliver high quality services and support. So where do you start? Planning a recruitment process is critical to helping you find the right person quickly. Read More >>>
November 21, 2014
Today’s IT is one of convergence, applications and a demand for constant availability. And when it comes to downtime, all of these elements combined with the fact that many new applications are being provisioned with SaaS providers have created the perfect storm for IT pros tasked with getting to the root of problems and keeping business running. The question, “Is it the network or the app?” has never been more critical, nor more difficult to answer.
November 17, 2014
This webcast will take a high-level look at technology trends within several major Data Protection domains, such as data loss prevention, storage system recovery, and data security.
November 17, 2014
Each year, retailers hustle and strain to get their online and in-store merchandise ready to entice shoppers for the annual Black Friday rush. Their main concern, of course, is whether this season’s merchandise will prove popular. But what might get overlooked, is whether they’ve done enough to ward off the worst kind of shopper: the Cyber Hacker — who preys on stores at peak holiday season and can cause serious financial and reputational damage.
November 13, 2014
There are now roughly two billion smartphone users in the world, and several hundred million tablet users. Add to that laptops and you get a considerable chunk of the world’s population that is always connected, on the go, everywhere, with their work and private lives in their pockets and handbags. But mobility has side effects… The cracked display is a common sight these days.
November 6, 2014
IBM (NYSE: IBM) today released its predictions for the 2014 holiday shopping season based on billions of online and in-store transactions analyzed by the IBM Digital Analytics Benchmark and IBM Quarterly Retail Forecast.
October 31, 2014
By Dave Wagner, TeamQuestThe increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>
October 29, 2014
If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.
October 28, 2014
Greetings, insignificant souls. You may call me … Gregor Castamere. It is not my true name. I stalked this strip of land when it was called New Amsterdam. My family’s name is well known. I have lived for more than 600 years, concealing my terrible secret. I am a vampire.
October 22, 2014
The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”
October 22, 2014
By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>
October 22, 2014
By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>
October 20, 2014
In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.
October 20, 2014
Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.
October 15, 2014
by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>
October 15, 2014
by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>
October 9, 2014
Recent months have seen a run of high-profile security breaches: social media sites losing phone numbers, retail stores skimming credit cards, healthcare organizations leaking patient records, and even celebrity voicemails and photo streams being hacked.
October 8, 2014
by Ken Berryman, BMC Software, Inc.The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through mobile devices. Read More >>>
October 8, 2014
by Bill Ho, BiscomData center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged within the healthcare, financial, and legal sectors. Read More >>>
October 2, 2014
IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.
October 1, 2014
by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>
September 29, 2014
by Dennis van der Veeke, SDLThere is no denying that brands have taken an increased interest in technology for marketing efforts. In fact, Gartner reported earlier in the year that 81 percent of organizations now have the equivalent of a chief marketing technologist position. Read More >>>
September 29, 2014
How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.
September 25, 2014
Data analytics is not a new concept, but why are today’s businesses still grasping at how to use this information source to create more efficient and effective businesses? A recent survey by Lavastorm Analytics of 495 analytics professionals and C-level executives looked at current analytic usage, trends and future initiatives of businesses when it comes to big data solutions. What we uncovered is that most businesses are not fully harnessing big data analytics benefits, even though more than half of those surveyed are rapidly growing their investment in analytics tools.
September 25, 2014
The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.
September 24, 2014
While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.
September 24, 2014
New technologies and business models from innovative, fledgling cloud vendors will have a staggering impact on the IT industry as these vendors compete against established vendors using a maverick approach to business operations. Large traditional IT vendors are suffering from stagnant revenues and experiencing further disruption as new tech offerings from smaller cloud companies change the consumption of IT.