The ongoing consumerization of IT is creating a shadow IT community, of which IT departments have little or no control. According to research, nearly 70 percent of employees who own a smartphone or tablet now choose to use it to access corporate data. The same...
The latest in Security
Featured article by Ashley Leonard, President & CEO, Verismic Software In 2013, 7 percent of U.S. based organizations reported a loss of $1 million or more, while 19 percent of organizations in the U.S. reported a loss of $50,000 or more, all stemming from the...
Featured article by Sarah Patrick, Analyst at Clutch The public’s perception of the Cloud seems to change constantly. In light of high-profile security breaches at Target (2013) and Home Depot (2014) and in the iCloud (2014), many users raised concerns about privacy...
Featured Interview with Kong Yang, Head Geek, SolarWinds  The market is rapidly evolving from traditional on-premises IT to a hybrid strategy driven by the cloud. Based on a 2015 survey of global IT professionals, the vast majority say they now work in hybrid IT...
Featured article by Tom Kelly, CEO, AccelOps Governments, utilities and businesses from every sector are embracing the possibilities of the Internet of Things (IoT). This interconnected environment promises safer public parks, more efficient factories, better...
Featured article by Kevin Patel, Service Assurance Technology Analyst at Xangati A majority of businesses are moving critical applications from physical personal computers to the virtual environment. A 2015 IT priorities survey confirms this where 76% of the IT...
SOURCE: AgreeYa Solutions Mobile devices are quickly becoming the primary devices among enterprises. Their great user experience, increased computing capabilities, explosion of apps, and always-on connectivity combined with agility, make them ideal replacements for...
Featured article by Fouad Khalil, director of compliance, SSH Communications Security No matter what an enterprise’s major market is, it is probably subject to regulatory compliance requirements, such as PCI, SOX, FISMA and HIPAA. PCI requirements in particular demand...
Featured article by LuxSci founder Erik Kangas Traditionally, information regarding health is closely guarded, available only to the immediate healthcare providers and patients involved. However, as electronic records become normal, and people allow health...
Featured article by Magnus Jern, President, Mobile Application Solutions Division, DMI No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9...


