Featured Article by Lisa Grady, Senior Solution Architect, Radiant Logic Don’t stop at federating with SAML or OpenID Connect, that's only half the battle When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access...
The latest in Security
SOURCE: Applied Research Associates, Inc. RALEIGH, Oct. 1  2014 – Applied Research Associates, Inc. (ARA) announced today that the open source BioGears® Physiology Engine Mini Build is now available for download. BioGears® is a $7M, multi-year program funded by the...
Featured article by Kelly Yee, VP of Marketing and Sales for Penango The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received...
By Israel Lifshitz is chief executive officer of Nubo Software While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world. VMI (Virtual Mobile Infrastructure)...
By Bill Manning, VP of Global Business Power Solutions for APC by Schneider Electric As a critical component to everyday functions, data is the lifeblood of every business no matter how big or small. As the amount of business critical data grows, the importance of...
SOURCE: FireLayers REDWOOD CITY, Calif. and HERZLIYA, Israel, September 17, 2014 – The shift to the cloud has been tectonic; however, the IT infrastructures of the last 20 years have not kept pace to adequately protect enterprise networks, data and transactions....
By Joe Kinsella, CloudHealth Founder and CTO Several years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to...
Featured Article By Mike Decker, Director of Managed Services at Annese & Associates, Inc. With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in...
Featured article By Omer Eiferman, CEO of Cellrox The bring-your-own-device (BYOD) movement is tempting Murphy’s Law on an unprecedented scale and changing the nature of the IT ‘blame game’ on Wall Street. In a world of desktops, tracking data leaks was much easier....
Featured article by Jim Manias, Advanced Systems Concepts, Inc. Benefits of the Architectural Approach for IT Development The power of data for creating investments and mitigating risk has a long history, with one of the most well-known examples occurring in 1815 when...


