cloud map
csuite tension

How to shield your company from cyber enforcement

Regulators and regulations are getting more stringent. You need a living, breathing and constantly evolving governance framework, but insurance is also critical

What happens when IT is guilty of Shadow IT?

When team leaders enjoy autonomy, you can end up with different technological solutions that solve the same business problem


Designing your business for the 21st century

“Most companies are simply not designed to survive. They become successful on the basis of one big idea or breakthrough product,” says CEO Mike Walsh of Tomorrow, a global consultancy that helps design 21st century businesses. The...

wrangle lasso

How to wrangle meaning from Internet of Things data

Without careful forethought, you will miss out on critical new insights

We don't need more InfoSec analysts: We need analysts to train AI infrastructures to detect attacks

Addressing the skills shortage with virtual analysts

chat bots

The next target for phishing and fraud: ChatOps

Cloud-based chat systems introduce a unique set of requirements given the breadth and depth of access to potentially sensitive data

iphone7 tim cook

Apple chief says AR will trump VR in commercial scenarios

Apple's Tim Cook suggests that the company is currently exploring augmented reality rather than virtual reality. However, despite the success of Pokemon Go both technologies remain stronger in the enterprise.

security automation robot

Explaining security automation and its evolving definitions

The four newest and most advanced elements you should consider

user authentication

Continuous Authentication: The future of Identity and Access Management (IAM)

Face it, people share devices and Web applications, so the key is to identify users by their ongoing actions  

linkedin hq photo from linkedin

Case study: How LinkedIn uses containers to run its professional network

LinkedIn has grown over the past 13 years from a single Java app with a web server into a $26.2 billion acquisition target by Microsoft. In that time, LinkedIn’s infrastructure and engineering had to grow with the company. Here’s how...

Use distributed antenna systems to complement small cells

Using small cells and DAS together improves cell coverage within a building and overcomes the limitations of using either alone

misunderstood contracts disagreement argue blame

5 commonly misunderstood compliance terms

Understanding the terms is critical given the complexity of compliance, and will help you when analyzing the best technology solutions to manage compliance as a whole

Key Success factors for adopting Node.js

Node.js takes asynchronicity to the extreme on the server, making it the perfect choice for I/O-heavy and highly concurrent applications

intro hp

10 acquisitions driving Oracle's cloud strategy

Oracle follows a pattern of either acquiring companies that bolster its existing market position in areas such as ERP or CRM, or buying firms that help it fill in gaps in the company’s broad portfolio. explores 10 key cloud...

The IEEE Standards Association initiates three new Ethernet projects

25G over single-mode fiber, 50/100/200G, and 200/400G

data center down

Anatomy of a service outage: How did we get here?

The right analytics system can help IT prevent problems before they actually crop up

Understanding the differences between virtual reality, augmented reality and mixed reality

There are many exciting use cases emerging, but network infrastructure will need to evolve

cloud backup

Key things to consider when assessing cloud backup and recovery

Cloud backup can be part of a comprehensive data protection plan, or a first step to a larger, hybrid cloud world

Load More