The next target for phishing and fraud: ChatOps

Cloud-based chat systems introduce a unique set of requirements given the breadth and depth of access to potentially sensitive data

iphone7 tim cook

security automation robot

Explaining security automation and its evolving definitions

The four newest and most advanced elements you should consider

user authentication

Continuous Authentication: The future of Identity and Access Management (IAM)

Face it, people share devices and Web applications, so the key is to identify users by their ongoing actions  

linkedin hq photo from linkedin

Case study: How LinkedIn uses containers to run its professional network

LinkedIn has grown over the past 13 years from a single Java app with a web server into a $26.2 billion acquisition target by Microsoft. In that time, LinkedIn’s infrastructure and engineering had to grow with the company. Here’s how...

Use distributed antenna systems to complement small cells

Using small cells and DAS together improves cell coverage within a building and overcomes the limitations of using either alone

misunderstood contracts disagreement argue blame

5 commonly misunderstood compliance terms

Understanding the terms is critical given the complexity of compliance, and will help you when analyzing the best technology solutions to manage compliance as a whole

Key Success factors for adopting Node.js

Node.js takes asynchronicity to the extreme on the server, making it the perfect choice for I/O-heavy and highly concurrent applications

intro hp

10 acquisitions driving Oracle's cloud strategy

Oracle follows a pattern of either acquiring companies that bolster its existing market position in areas such as ERP or CRM, or buying firms that help it fill in gaps in the company’s broad portfolio. explores 10 key cloud...

The IEEE Standards Association initiates three new Ethernet projects

25G over single-mode fiber, 50/100/200G, and 200/400G

data center down

Anatomy of a service outage: How did we get here?

The right analytics system can help IT prevent problems before they actually crop up

Understanding the differences between virtual reality, augmented reality and mixed reality

There are many exciting use cases emerging, but network infrastructure will need to evolve

cloud backup

Key things to consider when assessing cloud backup and recovery

Cloud backup can be part of a comprehensive data protection plan, or a first step to a larger, hybrid cloud world

fast data center

Four things to consider before upgrading your data center net to 25G

25G is backward compatible, jacks up performance and improves the efficiency of every workload

Maximizing value from your support services investment

Commitment to 5 core practices will lead to peace of mind and growth

Build, buy or rent your IoT communications stack?

The key things to consider when evaluating the options  

Artificial Intelligence vs. Intelligence Augmentation

Both conceived in the 1950s, which has greater relevance today?

group of diverse people in shadow against red/yellow sky with dramatic shadow

CIOs: Shadow IT is actually great for your cloud strategy

The three reasons that departments' own adoption of cloud technologies benefits CIOs' goals

ibm microsoft

Should Apple worry about Microsoft-IBM deal?

IBM’s new partnership with Microsoft nearly mirrors a deal the enterprise giant struck with Apple in 2014. But that’s where the similarities end.

mobile apps and touch screen

Download our new mobile management PDF

We've just created a new, easily printable version of our comparison chart with 11 vendors in 10 features/functions categories.

Load More