DevOps Early Adopters Say Open Source and PaaS are Key October 8, 2015 - 11:34 AM With DevOps approaches being used to create and run software across an increasingly broad spectrum of organizations, we're now at the point where we can gain quantitative insights from early adopters about DevOps adoption that go beyond a handful of oft-referenced Web-scale anecdotes.
Skyworks Acquires PMC Sierra in $2 Billion Deal October 7, 2015 - 3:12 PM Skyworks announced recently that it would purchase PMC Sierra in a deal totaling $2 billion. The transaction allows Skyworks to diversify its customer base as the semiconductor industry grows more competitive.
TechnologyAdvice Offers Tech Insight Ahead of ITEXPO October 6, 2015 - 4:55 PM TechnologyAdvice, a popular b2b technology research/review service, provides intel on a wildly diverse set of industries. While our readers will doubtlessly appreciate their VoIP, Cloud Storage, and CRM knowledge, the company also reviews gamification, HR, accounting, and project management software (among others).
Best Practices for Building Trust in Cyberspace October 6, 2015 - 8:48 AM In an increasingly hostile and volatile cyber landscape, trust is a vital yet sometimes elusive component of business. Establishing trust is easier said than done, and it's not getting any easier. Guest writer John Grimm, Senior Director at Thales e-Security, explains the best ways to build consumer trust in the digital marketplace.
GTISC: Cybersecurity Top Priority for Growing Number of Firms October 5, 2015 - 1:55 PM These days, it seems like cybersecurity is front and center for a lot of people. A new study from the Georgia Tech Information Security Center (GTISC) reveals that it doesn't just seem that way to the outside viewer: cybersecurity really is a big concern for many out there.
Six Things Your IT Support Might Be Missing October 5, 2015 - 9:11 AM Do you know what your IT initiatives are or what your IT support is working on? If you know the answer, great! You are among the few business owners who do. If you are not, here are six talking points to discuss with your IT support and how they can help your business.
AppliedMicro, Vapor IO Get Together For Telemetry Advancements October 1, 2015 - 5:37 PM Data centers are not easy things to manage. With an ever-increasing amount of data flowing through the system, which in turn needs to be regulated to make sure it all gets where it's going without an unnecessary bottleneck or the like. Certain tools, meanwhile, can make this process easier-though never really easy-to handle, and one such advance recently came out as a result of a new partnership between AppliedMicro Circuits Corporation and Vapor IO.
The xPaaS Revolution and the Rise of BizDevOps September 29, 2015 - 5:25 PM Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.
Mind the Gap: Eluding the ITSM Slippery Slope September 29, 2015 - 5:11 PM Administering ITSM comes with some slippery rabbit holes, and is much like the famous Alice in Wonderland quote: "If you don't know where you are going any road can take you there." We've heard a lot about the gaps between ITAM (IT Asset Management) and ITSM (IT Service Management), the gaps between ITIL and ITSM, and more recently the gaps between ITSM and ITSSM, and even the more nuanced maturation levels of your ITSM. Without timely and relevant data, your processes, people, governance, and your entire IT vision all become manipulated and bent in imprecise manners, yielding your ITSM ineffectual.
the xPaaS Revolution and the Rise of BizDevOps September 29, 2015 - 10:32 AM Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.
Keep it Simple: Why Simplicity Leads to Enterprise Success September 29, 2015 - 9:19 AM The modern workplace - specifically the enterprise - can be stressful. Overflowing email inboxes, numerous tasks and projects with tight deadlines, and too many enterprise systems with too many buttons and too many features. As if that weren't enough, complex business processes also exist with multiple stakeholders that need to be managed. The information systems that once promised to help us soon became so complicated that nobody knows how to use them properly. The enterprise reality is that employees spend too much time organizing their work and trying to simplify so they can understand what they need to do, how to do it and when to do it instead of doing actual work.
How VPS Hosting is a Cheap Alternative for Enterprise September 24, 2015 - 11:13 AM Since the origin of online business management, people have been comparing different resources of data management and security. There have been debates about using Virtual Private Server and how it serves better or lesser than other web hosting services. The cheapest VPS services are available from $18 but if you want better and more professional services, then you need to take out a few hundred dollars from your wallet only. But does that make VPS an economic solution for your online business?
Design for Manufacturing (DFM) Thinking in Advanced Development: Inject DFM Early and Often September 22, 2015 - 10:52 AM Advanced Development (AD) is the "sandbox" between classical research and development (R&D) and Product Development (PD). Living in this grey zone, engineers in AD are typically in a role where they mitigate risk on technology being released from an R&D environment. Why this intermediate AD activity? The output from research teams still needs a good bit of work to prove its readiness for a production-ready development effort. When teams are on a product development track, the cost of failure is high.
THE VIEW FROM THE CLOUD: Computer Forensics Tools September 18, 2015 - 4:28 PM It's official: the world is saturated with digital devices. The numbers aren't exact, but if Gartner forecasts are accurate, 4.9 billion connected devices are in use this year. This colossal figure is up 30 percent from 2014 and will reach 25 billion by 2020. However, that's not taking into account the comparison of real-time data from mobile network analysis firm GSMA Intelligence and the US Census Bureau (U.S. and World Population Clock). Their research shows the number of active SIM cards surpassed the number of human beings on the planet. That's more than 7.2 billion cell phones!
Threat Intelligence Comes of Age September 17, 2015 - 1:01 PM Several moves to update and modernize threat intelligence tactics have popped into the market this year, aiming to make it easier for companies to understand what they're up against when it comes to hackers, the Dark Web, fraud and other nefarious cyber-challenges.
Unsafe Web Browsing Means More Web Security Spending September 17, 2015 - 10:50 AM Few think much about that mid-morning pause to check out a YouTube video full of cute kittens, or a stop at a Facebook page to post a few notes about the morning's progress. But a new report from IHS suggests that Web security spending is likely to climb in the next few months, thanks in large part to unsafe practices when it comes to Web browsing.
DevOps Early Adopters Say Open Source and PaaS are Key September 16, 2015 - 10:13 AM With DevOps approaches being used to create and run software across an increasingly broad spectrum of organizations, we're now at the point where we can gain quantitative insights from early adopters about DevOps adoption that go beyond a handful of oft-referenced Web-scale anecdotes. These insights, garnered from an IDC InfoBrief sponsored by Red Hat DevOps, Open Source and Business Agility (June 2015) include open source as a top priority enabler, a wide range of benefits from using PaaS, and significantly faster software release cycles.
Cloud Server Shipments Slip in 2Q 2015 September 16, 2015 - 8:54 AM Recent research shows that the server market is going strong but that one of its driving forces, shipments to cloud data centers, has slipped in the most recent quarter of 2015.
Nine Laptop Applications You Must Have September 15, 2015 - 11:50 AM When you purchase a new laptop, it usually comes with a large assortment of software already preloaded. Some of the applications are free to use, while others are offered on a trial basis. However, new applications are developed all the time that offer a wide range of functionality and features to enhance your computer and your capabilities. But it can be a daunting task to search through the thousands of applications currently available. Following is a list of nine software essentials that you should definitely seek out and install on your new laptop.
So Much Technology, Not Enough IT Professionals September 15, 2015 - 9:12 AM The business world relies on technology more than ever before; in fact there is a shortage of skilled IT workers that is hurting several businesses just as they even get started. A new report indicates that there is now an unprecedented shortage of IT professionals in the business world as a whole. The same report shows that 90 percent of C-level executives think that recruiting and training top technology talent is an especially large challenge these days. The report, put out by Appirio took the responses of more than 200 C-level execs and 200 IT staff members in the U.S. and U.K.
Marriage and Storage Performance -Both Involve compromise? September 14, 2015 - 11:00 AM The DBA wants low latency; the VDI team want all-out IOPS. The VMware guy wants control, the storage admin wants granular management. The CFO wants low cost, the CIO wants low operational overheads. In many ways, enterprise data storage is all about compromise. And compromise is defined as giving up one thing for another. It is very important to realize that there is a huge difference between compromise and sacrifice.
Hacking on the Move: The Threat to Cars Through Metromile September 10, 2015 - 2:04 PM People don't have nightmares about monsters anymore; they dream about hackers breaking into their computers, phones, and other devices and stealing private information. Now, there's even more to worry about. Hackers can take things one step further by attacking vehicles. In a recent case, researchers from the University of California at San Diego demonstrated how simple it is for hackers to invade vehicles through their insurance dongles, and wreak havoc with the systems.
How to Avoid Business Downtime: Four Lessons from a Formula One Pit Crew September 8, 2015 - 11:18 AM You're zipping around Monza at the Italian Grand Prix, slowing to the corner of the first chicane when your carbon-carbon disc brakes overheat and explode along with your rear tire. Up until then you were leading the pack by half a lap with 10 to go. What next?
Brains vs. Brawn - Cracking the Seventh Layer September 4, 2015 - 3:12 PM You are a well-respected CTO of a major hosting provider. You recently invested in and installed the latest network security solutions to your data center and are looking forward to getting a full night's sleep, knowing you have taken the proper measures to secure your company's data. Then the phone rings and your security team relays the bad news: you have suffered a DDoS attack. Not only did your website go down, but it went totally unnoticed until several back-end systems were almost completely unresponsive. You ask yourself, "How this could possibly have happened, given the network security landscape our team has implemented?"
Designing Next-Gen Data Centers in the Era of Big Data September 2, 2015 - 11:47 AM Big data has revolutionized the way we think about data center design and orchestration. However, it's important not to get carried away with the hype, and to understand that big data cannot be looked at in isolation when considering future data center planning.
Most Organizations Are Not Taking Advantage of PaaS and Other Cloud Agility Tools August 31, 2015 - 2:22 PM A majority of businesses are placing themselves at a competitive disadvantage by overestimating how agile they are at developing and launching new applications. A new study from Oracle shows that businesses believe they are agile, yet fail when it comes to flexibly managing their workloads or being able to speedily develop, test and launch new apps.
Survey Reveals That People Want to Completely Replace Passwords August 28, 2015 - 9:30 AM LaunchKey, a company that has made a name for itself as a mobile authentication platform released the findings of recent survey earlier this week. That survey found that password-based authentication is not capable of meeting demands of information security. Because of this factor, the survey found that a massive 84 percent of respondents are in support of throwing away the practice of passwords altogether.
How Adam Schefter's Accidental ESPN Firing Could Have Been Avoided August 27, 2015 - 5:41 PM At one of my previous places of employment, a senior executive once fired his new employee who had uprooted his family to move to a new city to pursue the opportunity he was currently in. Luckily, it was not real - it was just the worst April Fool's joke in history.
5 Tips on How Proxies Can Help Your Business August 27, 2015 - 5:39 PM Protecting your business's servers is likely one of your top priorities, especially if those servers contain sensitive customer information. Top security experts know that one of the best ways to protect a server is through the use of proxies, which block direct access to the network. But how do small businesses put this technology to use on their own networks?
Recent Court Ruling Grants FTC Power to Regulate Cybersecurity August 27, 2015 - 3:46 PM A recent U.S. appeals court ruling granted the FTC explicit power to regulate cybersecurity, citing the lack of legislation governing this area and the FTC's innate and broad authority to protect consumers from unfair and deceptive trade practices.
Amazon Bans Flash Ads Starting in September August 27, 2015 - 12:24 PM Amazon announced earlier this week that the company would no longer allow Adobe Flash on its website. The e-commerce giant announced that the change will be taking place rather quickly, going into full effect on September 1. The firm says that the ban is an effort to make sure that all of its customers have consistent experiences when they visit the website.
The Power of Two: Network and Application Visibility are Better Together August 26, 2015 - 3:41 PM I bet you don't need more than one hand to count the number of seconds that pass between the onset of an application or network performance issue and the arrival of the first IT helpdesk ticket . . . or irate phone call. However, identifying the exact cause of the service degradation often takes a little more time and effort.
Tractica: Computer Vision Technology Making Big Gains in Short Term August 26, 2015 - 1:24 PM Computer vision technology-which involves turning image and/or video sequences into quantifiable data-isn't a commonly-considered technology, but if word from Tractica pans out, it will be in the near-term future. Tractica's newest report suggests that growth for computer vision technology is set to be strong over the next few years, and as such, around 182.7 million devices that incorporate computer vision in operations will be shipped annually by 2019.
How Smart CIOs Select Integration Platform as a Service (iPaaS) Providers August 26, 2015 - 11:35 AM Disruptive shifts in corporate IT are changing the game for the modern CIO, and the implications of this transformation are especially apparent when it comes to integration. There has been a proliferation of integration solutions and vendors hitting the market, and the responsibility of choosing the right one for his or her company falls squarely on the shoulders of CIOs.
New Operating Model Enables Companies to Compete in the Digital Age August 26, 2015 - 10:38 AM Competitiveness in the digital age is upending the way that many companies have operated for decades. Products and services used to enjoy a much longer lifecycle than the innovations brought to market today. Market cycles as short as just a few weeks are common.
Crowdsourcing Enterprise Knowledge: Applying Crowdsourcing to Internal Company Resources August 26, 2015 - 7:23 AM One of the most widely regarded standards of crowdsourcing is from Jeff Howe's book, where it's said that no company has all of the smartest people working for them. Perhaps; but most companies of any size have an impressive roster of skilled people. That's how they became successful! And in various ways, companies use crowdsourcing every day to access some of the best technology researchers in the world.
Delivering Updates with the Least Amount of Effort: A View from the Inside August 25, 2015 - 2:53 PM Be it a major functionality release within a product's core evolution or a security issue fix, frequent delivery of updates to all corporate clients is fraught with risks and almost implausible without continuous delivery tools and proper mindset. My goal for this article is to share some best practices for establishing effective updates during the delivery process on an as-needed basis with as little pain as possible.
Is Your VPN Made Vulnerable by WebRTC? August 25, 2015 - 9:12 AM The reality is we're in an age where many of us will trade some of our privacy for access to better deals, more personalized offers and even seamless connectivity with the companies with which we do business and want to communicate. Too often, however, we take these risks without fully understanding what we're giving up in the process.
Intel's Rack Scale Architecture Demonstration Features PCIe Storage Switches from PMC August 24, 2015 - 11:23 AM PMC, a provider of enterprise and data center solutions for networked and server storage applications, recently demonstrated the advantages and capabilities of its Switchtec PSX PCIe Storage Switches at the Intel Developer Forum. The Switchtec PCIe switching architecture was presented as an industry partner solution in the Intel Rack Scale Architecture (RSA) demonstration.
Windstream Has Entered into HP's PartnerOne Program August 21, 2015 - 3:50 PM In an effort to become even stronger in the cloud-ready solutions field, Windstream recently announced that it is partnering up with Hewlett Packard and joining the HP PartnerOne Program. This particular program is geared toward helping service providers bring innovative hosted solutions to potential clients quicker and easier than ever before.
IT Security Officers Believe They are in Nation-State Cyberattack Crosshairs August 18, 2015 - 8:41 AM Those in the security business may be deserving of a hearty welcome back from scorching Las Vegas, which was ground zero for hackers, good and bad, for the last few weeks thanks to the Black Hat USA 2015 and Defcon5 conventions. Based on preliminary reports, nobody got hurt, but the news was certainly enough to send attendees of both scurrying to the local pharmacies for some strong antacids.
Hackers Report Easy Access to Privileged Accounts Despite Increased Security Spending August 17, 2015 - 2:37 PM Hackers are regarded, and not without reason, as one of the greatest dangers information technology can face. While there will be some discussion over that point-especially in terms of the distinction between hackers and "crackers," or white hat versus black hat hackers-the point remains that those who would enter systems without permission are still a major threat.
Lenovo, HTC Slash Jobs in Response to Flagging PC Sales and Crowded Smartphone Market August 14, 2015 - 10:59 AM In a true testament to just how disruptive the cloud and mobility have been in the traditional tech space, Lenovo has announced plans to cut 5 percent of its workforce, the equivalent of about 3,200 jobs. The company has been experiencing declining revenues and struggling with the steady decline of the PC market.
Malicious Firmware Hits Cisco Customers August 14, 2015 - 9:46 AM Hackers are a unique breed. Their ability to learn, adapt and continue infecting devices is truly impressive. It seems as though before security firms find a solution to the latest attacks, the hackers are already breaking the new code.
New CISOs Face Emerging Universal Challenges August 13, 2015 - 4:03 PM The office of chief information security officer (CISO) has two primary issues facing it before a new CISO can even set his or her briefcase down and find a chair: rapidly increasing numbers of regulations addressing the field of information security, and increasing numbers of threats coming from data breaches as hackers start to realize the value of data kept on hand.
Is it Time for an Inside-Out Cleanup of Your Website? August 12, 2015 - 1:01 PM Building and maintaining a website is very similar to building a house: you need to keep it safe, clean and visitor-friendly. But unlike the dust that settles atop the various objects in your house, a dirty website doesn't always show symptoms of a much needed cleaning. So, how often should you clean your website? Weekly? Monthly? How about 24/7?
The First 100 Percent Cloud-based Supply Chain Execution Convergence Solution is Here August 12, 2015 - 11:43 AM LogFire, a cloud-based provider of supply chain fulfillment solutions, is integrating its Warehouse Management System (WMS) with Oracle Transportation Management to create the cloud solution. This will connect networks in real time so companies can lower fulfillment cost and increase the speed in which transactions are processed.
Five Ways Managed File Transfer Improves IT Agility & Productivity August 11, 2015 - 3:05 PM In the past five years, the amount of data stored has grown hundreds of times over-meaning organizations of all sizes, across industries are challenged with safeguarding this quantum level of sensitive information and securely transferring it. While protecting data is the responsibility of everyone within an organization, IT professionals inevitably own this task and are held responsible when something goes wrong. Consider the added pressure of state and federal regulations and it's clear that file transfer administration can stretch IT departments thin, keeping them from being more responsive to business needs.
Data Management is the First Step to Achieving Business Agility in the Customer Age August 11, 2015 - 2:56 PM We have entered the age of the enlightened and empowered customer, and companies are being challenged to meet a growing number of demands. Customers are using social media, mobility and other platforms to wield their purchasing power and influence and businesses need to be able to meet them head on to get a handle on managing the customer experience.
Accenture Tops Gartner Report as IT Services Provider August 11, 2015 - 11:56 AM Communication service providers (CSPs) are companies that assist communications vendors with all manner of product fulfillment and customer interaction. Behind them are the IT services providers that support those goals with hardware and software for processing of digital data such as that for analytics and communications.
IT Groups Increasingly Tapped for Innovation Amid Pressure from Leaders August 11, 2015 - 11:47 AM Information technology (IT) groups are increasingly being viewed as the goose that lays the golden eggs in many companies. While some are content to allow those eggs of value to come naturally, others are demanding an increased egg-laying pace. A new study from the Business Performance Innovation (BPI) Network shows just what's being expected from IT these days.
3 Steps to a Better Virtual Workspace August 11, 2015 - 7:25 AM There are plenty of reasons why more and more companies have been implementing virtual workspace technologies. Sometimes it's an international team or a salesforce that's always on the move. Other times it's just a brutal commute that doesn't need to be done every day.
Executives See Need for IT Improvement but Lack Execution August 10, 2015 - 4:51 PM It is summer here in the northern hemisphere and the heat is on. In addition to the scorching temperatures, it is also report publishing season, and my summer reading has been filled with some hot insights that are worth sharing. In fact, I'd like to draw attention to the latest addition to my digital library: the new study from international executive change advocacy group, Business Performance Innovation (BPI) Network, titled, "Accelerating Business Transformation Through IT Innovation: Getting the Business Leader Take on the IT Change Mandate."
Combating New IT Security Challenges: IPv6-Based DDoS Attacks August 10, 2015 - 10:54 AM IPv6. We've heard it's been coming for years but no, it's not here yet. However it's "here" enough to be a security threat to every organization that has started their migration to IPv6. With IPv6 adoption comes new security challenges. Although only 25 percent of websites completely support IPv6 today, many more are supporting v6 in parts of their network, whether their operators know it or not.
Lantronix Updates SLC 8000 with FIPS Encryption August 10, 2015 - 10:46 AM Lantronix has long developed its SLC 8000 modular console manager to tackle in-band and out-of-band enterprise IT equipment management. The company's latest development concerns its release of 18.104.22.168 of its flagship hardware.
XCEL to Leverage Canadian Web Hosting to Deliver VMware-based Cloud August 10, 2015 - 9:15 AM XCEL Professional Services provides IT support and consulting services to major cities in Western Canada. In order to expand its service offering, it will now partner with Canadian Web Hosting which offers enterprise-grade infrastructure-as-a-service throughout the country.
Accellion Releases kiteworks Governance Package August 10, 2015 - 9:09 AM Accellion develops its kiteworks for enterprises so they may securely share files and remain in compliance with legal and regulatory requirements. The company's most recent announcement regards some additions to the security and governance capabilities of that software.
How Security Companies Fuel Their Channel Partners: Part 2 August 10, 2015 - 6:23 AM Gartner estimates the global information security market to be worth $76.9 billion today, and it is not only enormous, but it is also complex and multi-faceted. There are truly hundreds upon hundreds of cybersecurity suppliers for IT executives to sift through and analyze to stay ahead of the threats. This is why IT security consultants play such a critical role in the value chain, and enterprises rely on them to stay up on the threats and recommend the best solutions to protect their businesses.
10 Things IT Admins Should Keep in Mind for Windows 10 on Mobile August 6, 2015 - 3:44 PM Windows' Smartphone market share is hovering at a lowly 3 percent, but hopes for Windows 10 on mobile are high. According to CEO Satya Nadella, Microsoft's "big mistake" was to focus on the PC as the perpetual hub for everything. As result, the company was slow to recognize the importance of mobile devices, and this opened up the fast-track to obsolescence.
The True Nature of the EMV Liability Shift August 6, 2015 - 9:10 AM The U.S. payments industry is bracing for the October liability shift for EMV adoption. Though the U.S. market accounts for more than half of the world's payment transactions, it is an unregulated market with an array of players: merchants, processors and payment terminal manufacturers, independent software vendors, merchant banks, credit and debit card issuers and more. The scope and uniqueness of this market makes the pending migration to EMV particularly complex.
Laying Out Benefits of SD-WAN Solutions August 5, 2015 - 6:21 PM Talari, a company that has been recognized as one of the global leaders when it comes to providing Software Defined WAN solutions has just gotten a rather large honor when it was named as a top provider for SD-Wan solutions by industry analyst Gartner. Talari was named in a report called "Technology Overview for SD-WAN" and it should be pointed out that the firm has to be having some rather decent success if it is going to make a mention for such a well known analyst firm.
Yahoo's Ad Network Attacked and Exploited by Hackers August 5, 2015 - 2:24 PM Why do something yourself when you can get others to do the work for you? This seems to be the thought behind hackers who attacked Yahoo's ad network. Cybercriminals, or hackers, found a way to utilize Yahoo's own ad network as a deliver system for malware to an undisclosed number of visitors.
Wheelings & Dealings: Zscaler Nets $100 Million in New Funding Round August 5, 2015 - 9:18 AM Already considered one of the top security firms in the world, Zscaler has just landed a brand new round of funding that totals around $100 million that was led by TPG Growth. The firm is one that has made its bones focusing on making enterprise networks safe to connect to the Internet by first scanning and then filtering traffic.
How Security Companies Fuel Their Channel Partners August 4, 2015 - 4:02 PM The cybersecurity market has been one of the hottest sectors in IT since the early days of the Internet, and it is now seeing renewed sense of urgency as "hackers and nation states are increasingly targeting websites in an attempt to gain illicit access to enterprise networks and highly valuable digital assets," according to Frost & Sullivan Network Security Analyst, Chris Rodriguez (Apr. 2015). Therefore, it's no wonder that IT decision makers' spending on security technologies will increase 46% in 2015.
EdgeConneX to Host MASS IX Node at Boston Edge Data Center August 4, 2015 - 3:32 PM EdgeConneX, a company specializing in hosting solutions at the edge of the network, has announced a partnership with the Massachusetts Internet Exchange (MASS IX). Mass IX will build a new remote node at the Boston Edge Data Center.
What Enterprise IT Needs Besides Docker August 4, 2015 - 2:58 PM Let me be clear: Docker is a fantastic technology that is enjoying widespread adoption by enterprises. A recent StackEngine survey found that more than 70 percent of respondents are actively evaluating or using it. However, for reasons that will be discussed below, Docker alone is not sufficient for enterprise use.
Is it Time to Let Companies Shoot Back in Cyber Warfare? August 4, 2015 - 12:58 PM Some of the greatest dystopian cyberpunk future tales, particularly those of William Gibson, envision a future where corporations staff militaries for use against a variety of enemies both foreign and domestic. The idea that such a future could come to pass would have seemed ludicrous until the recommendation of Juan Zarate emerged, suggesting that private companies should be "deputized" to strike back against cyberattackers.
Google Paper Highlights Experts' and Non-experts' Security Practices August 4, 2015 - 12:19 PM A recent Google research paper that addresses information security is making the rounds at various tech news sites. It offers a number of suggestions for what you can do to properly protect yourself and notes what you may be doing wrong in those attempts.
Declare a Permanent Truce in the IT War Room August 3, 2015 - 9:08 AM While the development of cloud and SaaS-based applications and services has done wonders to improve how knowledge workers collaborate and share information, it is also wreaking havoc on enterprise IT departments.
Microsoft's Support of Secure Shell: What it Means and What Lies Ahead July 30, 2015 - 9:10 AM With 128,000 employees and annual revenues of $86.8 billion, Microsoft is a mega-corporation. It is the third most valuable company in the world by market cap and its software powers the majority of home computers, industrial and financial systems. So, when Microsoft announces a change in direction, it's worth taking notice.
Is it Possible for High Tech to Generate More Service Revenues? July 24, 2015 - 9:43 AM By providing customers with subscription services, for example, high tech companies improve the buying experience of customers because they can continuously evaluate the hardware, software or service. Experiences customers have using these become paramount. High tech companies could investigate how this new model supports business strategies, increases their chances of possessing the underlying capability blueprint to support new subscription models, and affects their operations.