Featured Articles
Latest on Inside The Briefcase
SOURCE: InfoWorld How do many enterprise IT departments approach cloud computing? Their path mirrors that of a person going through the stages of grief: denial, anger, and acceptance. Stage 1: Ignore the problem When retail-oriented public cloud providers began to...
5 Cloud Predictions for 2014 by Pat O’Day, CTO, Bluelock 1. Consolidation and Recalibration: As the cloud market matures there will be some churn in the space, but mostly through consolidation and recalibration. While some smaller companies may fall away or run out...
Watch this webinar to learn best practices from healthcare customers and seven ideas that will help improve your network security investments, including: • Emerging security challenges in healthcare: mobile medical workstations, mobile devices, EHR, and HIE • How to...
Featured article by David Pope and Dan Zaratsian, SAS The Big Data Dilemma: What to Capture, and What to Keep Technology enables you to capture every bit and byte, but should you? No. Not all of the data out there is relevant or useful. Organizations need to separate...
In this interview, Chris McNabb from DELL Boomi emphasizes the value of integration within the cloud movement, and offers expert advice for organizations looking to overcome security and compliance issues arising around the proliferation of cloud computing and mobile...
Featured article by Yves de Montcheuil, Vice President of Marketing, Talend A Perfect Storm describes an event where a rare combination of circumstances will aggravate or amplify a situation drastically. The second half of 2013 has seen more and more big data projects...
In this interview, Bill Ho, President at Biscom, offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Q. What are some of the driving factors that will affect Secure File...
Fresh Ink
Latest Tech Insights

