Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Datameer 6: Dealing with Big Data the Easy Way
May 25, 2016 - 6:42 AM
The solutions puts smart data discovery to work, allowing users the ease of point and click functionality, and providing a more streamlined process. The next generation solution reworks the archaic linear steps of integration, preparation, analytics and visualization one simplified action. The need for specialized tools and skill sets is alleviated.

End of Life for Internet Explorer
May 20, 2016 - 8:28 AM
While it shouldn't impact the average home user with the default Windows Update settings, businesses are a different subject. Many businesses are not always updated to the latest patch level for a number of reasons.

U.S. Veteran Affairs Department Puts Out RFI for Help with Dark Web
May 18, 2016 - 9:00 AM
The best analogy that comes to mind is the invention and development of what we in the tech industry would call "use cases" for atomic energy. Fission and fusion are capable of both powering the world as well as destroying it. The famous phrase, of questionable origin, "With great power comes great responsibility," comes to mind. Like it or not, the Dark Web is here and here to stay, and everyone needs to be mindful of its capabilities for good and evil.

How to Tame Your Big Data So it Works for You
May 17, 2016 - 8:16 AM
Raw data is like a natural resource that is easy to find nowadays, but it's not quite so easy to collect or work with. Refining it into the useful ore that is organized data, from which valuable business intelligence (BI) can be derived and used to grow business success, is the central challenge of making big data work for your business.

How to Make Agile IT Portfolio Management a Success
May 16, 2016 - 5:44 PM
As many project management offices have experienced, shaving even small amounts of time off valuable IT projects can deliver big returns. So how do you compound that and make it work throughout your organization? Some ideas and principles from "agile" help to make IT Portfolio Management more efficient.

Building the Right Software Team
May 16, 2016 - 1:21 PM
Building the right Software team is hard but the payoffs are huge. Having the right team that can work, grow, and have fun together will ensure that as the technology and demand for software grows, your team is ready to provide the highest quality solutions.

Innotas Finds 50 Percent IT Industry Project Fail Rate
May 12, 2016 - 6:51 PM
A recent Innotas survey shows that a lack of resources and improper management caused 50 percent of the research group's latest respondents to see an IT project fail in the past 12 months.

How Long Should Companies Support Old Tech Before Pushing Updates?
May 11, 2016 - 8:01 AM
One of the most concerning things about buying into new technology - at least when it's first introduced - is the question of how long it will be supported. Time and time again we have seen situations where a company folded, was acquired by another company, or just plain stopped providing support for a particular product.

Inside Dark Web Incites Interest and Welcomes Industry Leaders
May 9, 2016 - 3:56 PM
The Dark Web was created to provide secure communications for whistle blowers, government agencies and the like, but today it is a tool for nefarious acts. Whether it's ordering illicit drugs or selling credit card and social security numbers, this underground network offers anonymity to evil-doers but this powerful weapon can be wielded by the "good guys" as well.

6 Tips to Becoming Better at Ruby On Rails
May 6, 2016 - 12:08 PM
Ruby on Rails is certainly a very useful language to learn these days, but its many applications and wide functionality mean that there's a long road between beginning to learn and mastering the language. With that in mind, here are six tips to becoming better at Ruby on Rails:

It's A Trap! Preparing For Smokescreen DDoS Attacks
May 6, 2016 - 10:21 AM
The threat landscape is more complex than ever, and establishing a cybersecurity strategy in 2016 entails accounting for a number of different factors. Hackers will employ a variety of techniques to achieve their goals. In order to establish a viable defense, enterprises and VARs must select the necessary technology for countering different forms of attacks.

Web-Based Document Capture Helps Make Sense of Data
May 3, 2016 - 9:08 AM
. With technology advances in cloud, mobile and social, the paradigm shifts in information management have and are moving fast - to the web.

5 Online Technologies That Seem Secure - But Aren't
April 25, 2016 - 3:38 PM
More often than not, the convenience offered by the Internet often outweighs the concerns we should have. Hackers find their success through persistence so you need to do the same. While users need to be able to trust the security measures put in place, those security measures are only as good as the diligence put into their configuration and implementation. When all else fails - verify before you trust.

Ericsson Reorganizes in Effort to Build Growth, Profitability
April 22, 2016 - 7:23 AM
Radio and transport will fall under the auspices of Business Unit Network Products. Customer support, managed services, and network rollouts will be handled by Business Unit Networks Services. Together these core business groups will focus on incremental improvements in networks business performance, and capturing 4G and 5G opportunities.

Intel Launches Restructuring Initiative, Decimates Global Workforce
April 21, 2016 - 1:59 PM
The world no longer largely runs on the desktop PC. While there are still plenty of use cases that call for such a device-PC gaming, heavy-scale word processing and so on-more and more people are turning to tablets and smartphones to both work and play. That means firms like Intel-who once built great empires on the strength of PC sales-must change as well. Intel recently launched a major "restructuring initiative" to accommodate this market change, and in the process, left a lot of people looking for work.

About Windows 10 Branch Updates
April 13, 2016 - 8:03 AM
The LTSB works in much the same way as Windows has always done with regular updates every month and product updates every few months. Alternatively, customers can choose to use the CB method which provides security updates, bug fixes and new features every few months in what is commonly known as Servicing or a Branch Update.

Is Your Website Safe? More Businesses Choose WAF for Website and App Protection
April 12, 2016 - 8:27 AM
A server attack can cause serious problems for a business, leading to a loss of income and reputation damage as customers try to visit, but are turned away. Today's savvy businesses work hard to keep their websites safe from attack, demanding the strictest security from their third-partY hosting providers and IT teams.

5 Steps To Improving Your Business's UX
April 6, 2016 - 3:47 PM
Regardless of what industry you're working in, it's very likely that competition within your business's field has only become more cutthroat in recent years. Indeed, thanks to the boom in ecommerce and the increasing ease with which people can connect with each other all over the globe, markets have become increasingly crowded as businesses go to battle over their potential customers.

NEC Launches New Codec to Solve the 4K Content Delivery Conundrum
April 6, 2016 - 10:12 AM
Seeing as how the question of how to deliver 4K content effectively while considering the average user's bandwidth restraints has been hanging in the air for some time, this may seem too good to be true. However, NEC claims its new product series is capable of encoding 4K video at approximately one five hundredth of its original size, while performing ultra-low delay encoding and decoding of around 99 milliseconds. It also supports BT.2020 and HDR, a next generation technology that expands the color gamut while increasing brightness.

Steltix Version Workbench Receives Oracle Validated Integration Certification
April 4, 2016 - 1:51 PM
Steltix recently announced that its Version Workbench 3.6 has successfully integrated with Oracle's JD Edwards EnterpriseOne 9.2 and meets Oracle Validated Integration (OVI) standards.

A New Approach to Retailer/Supplier Collaboration: How Data Sharing Can Transform Profit Margins
April 4, 2016 - 1:18 PM
In the past, relations between suppliers and retailers may have grown contentious over as little as ten cents over a case of soda, and the cumulative effect of these little decisions are what managed the grocery retailer's business. Instead of making decisions on a unit price basis, retailers need to be looking at the total business. A change in management style is needed. The ability to share data and use analytics to improve joint decisions has the power to transform profit margins on both sides. In today's competitive markets, this new approach can make all the difference.

The System That Cried Wolf
March 31, 2016 - 8:50 AM
The post-mortem activity is just as messy. The current methods of having subject matter experts get into a war room, going through multiple product consoles and logs to identify the cause of an incident with a lot of finger-pointing and passing the buck that is inherent in the process, is putting companies at a severe disadvantage. This article will highlight how deep machine learning-based, root-cause analytics and predictive analytics technologies are helping organizations dramatically prevent such incidents, reduce mean time to repair and save brand reputation.

Study Reveals Lack of Confidence in Federal Data Centers' Capability
March 30, 2016 - 2:14 PM
A recent study from a partnership that seeks to improve government IT infrastructure shows that only a little more than a tenth of federal IT managers believe their agencies are ready to meet current institutional goals.

Microsoft: If You Can't Acquire Them, Invest In Them
March 29, 2016 - 6:00 AM
Conventional wisdom is often conventional because it's true, and Microsoft demonstrated as much by becoming a "significant participant" in a new strategic investment in a special company.

NTT Data to Buy Dell Services in $3 Billion IT Services Deal
March 28, 2016 - 12:26 PM
NTT Data and Dell are combining their managed IT services businesses in a massive acquisition valued at more than $3 billion. NTT will purchase Dell Services, absorbing its cloud, infrastructure, application and business outsourcing solutions while broadening its brand and global focus.

B2B Integration: Survival of the Fittest
March 23, 2016 - 5:44 PM
In 2016, what really separates B2B integration from legacy internal integration architectures such as enterprise service bus (ESB) or extract, transform, load (ETL)? Have the natural forces of technology and the resulting evolution of business applications simply rendered the distinctions meaningless? If so, which architecture has adapted to become the winner? Which is on the endangered species list? And have any evolved into the ungainly evolutionary equivalent of the giant three-horned chameleon?

Accenture Study Finds Companies Fail to Learn from Mistakes
March 23, 2016 - 5:19 PM
A recent survey from management consulting firm Accenture found that the number of U.S. companies that fail to learn from their past mistakes has nearly doubled from a similar survey the firm completed three years ago.

Informatica to Optimize Business Value from Data Lakes
March 23, 2016 - 2:15 PM
According to recent market research by Technavio, the big data enabled market will grow at a CAGR of 23 percent by 2019. The biggest driver for this growth is the increased data volume from organizations across virtually every sector and their need to improve business productivity and efficiency. So it is critically important to optimize business value from data lakes.

Rise of the Algorithm Economy - Making Sense of Big Data in the Always-On World
March 22, 2016 - 6:57 PM
Data has become the currency of the Always-On world. But on its own, it is not enough. Companies need to make sense of the wealth of data they have. This is where the algorithm economy comes in.

Applying March Madness Bracketology to Project Portfolio Management
March 22, 2016 - 3:12 PM
You wouldn't pick your March Madness bracket without consulting third party expert and sports analyst opinions, so why would you pick a Project Portfolio Management software without doing the same?

Finding: More Employers Paying for IT Professionals' Certifications
March 22, 2016 - 6:00 AM
The number of employers in the U.S. that invest in staff development through job training and certification has grown by 10 percent since 2014.

Intel Announces Support for Vulkan API
March 22, 2016 - 6:00 AM
Intel has announced its support - still in beta version - of its 6th-generation Intel Core and related processors for the new Vulkan 1.0 Application Programming Interface.

Preventing DNS-Based Data Exfiltration
March 17, 2016 - 5:33 PM
Several high-profile data breaches have been in the news recently. We read that millions of customer records are stolen, emails hacked, and sensitive information leaked. Most enterprises have multiple defense mechanisms and security technologies in place, such as next-generation firewalls, intrusion detection systems (IDSs), and intrusion-prevention systems (IPSs). Yet somehow malicious actors find a way to appropriate data. So what types of data are being stolen?

Rise in Security Awareness Pays Off Big for Wombat Security
March 16, 2016 - 3:40 PM
These days, a keen awareness of security matters is vital for continued growth. Those who don't have a good handle on security are more likely to be breached, their data stolen, and their public face irrevocably altered...and not for the better. That's given companies like Wombat Security Technologies some real growth potential, and Wombat has seen a three-year annual growth rate over 900 percent strong in the face of a more security-conscious business environment.

MegaPath Delivers All-in-One Security with Managed IPsec VPN and Unified Threat Management
March 16, 2016 - 3:30 PM
Provider of voice, data, security and cloud services in North America MegaPath has announced the release of a new solution, Managed IPsec VPN and Unified Threat Management (UTM). This new managed network and security service was designed to be simpler and faster than competing private networking solutions and is compatible with practically any commodity internet connection. Because of its low cost to get started, quick implementation and ease of management, it is well-suite to the needs of small to medium-sized businesses (SMBs).

It's Not Too Late to Migrate from Microsoft SQL Server 2005
March 16, 2016 - 2:07 PM
Planning at a granular level can help mitigate many of the risks of a migration, and keeping the above considerations in mind when selecting migration software can help a business make the right move and migrate with confidence.

Dynatrace Releases DC RUM Version 12.4 with New Performance Analytics
March 14, 2016 - 1:45 PM
The data centers of today are operating under a dynamic environment in which organizations of all sizes are accessing a wide range of IT services to run their business.

Dynatrace Releases DC RUM Version 12.4
March 14, 2016 - 1:22 PM
As organizations move to hosted and application intensive IT services, analyzing the performance metrics in the context of the user's experience makes it possible to identify and prioritize the most pressing problems so IT teams can resolve them.

Accenture: CFOs Need to Get Busy with Strategic Cost Management
March 11, 2016 - 7:36 AM
A new study says about a quarter of CFOs are talking the talk, but far fewer are walking the walk when it comes to more strategic spending - and saving - to better address disruptive forces in the marketplace.

IntelliChief Launches ECM Update with Plenty of New Features
March 9, 2016 - 2:55 PM
IntelliChief is known as the company dedicated to improving enterprise content management (ECM). As such, it's not surprising that it recently released a new version of its own ECM offering with a number of new features and enhancements.

Hybrid Cloud Popularity Due to Flexibility, Ability to Commercialize Data Insights
March 9, 2016 - 1:53 PM
With cloud security worries still very prominent, according to a recent survey from Consilio, it's not a huge surprise to see new data from IBM showing the growing popularity of hybrid cloud deployments. Aside from giving companies the option to maintain on-premises storage for more sensitive data, the hybrid cloud approach delivers a lot of functional benefits as well.

3D Printing: Rocking Manufacturing
March 8, 2016 - 5:20 PM
3D printers are the most powerful machines ever invented because they can make finished products, with all their parts, fully assembled. Driven by a digital blueprint, they build layer upon layer of fused plastic, metal, or other materials.

How VDI 2.0 Lowers IT Costs in Any Business Organization
March 8, 2016 - 5:16 PM
VDI or Virtual Desktop Infrastructure is the practice of hosting a desktop operating system within a virtual machine, which resides within or runs on a centralized server. This type of desktop virtualization enables fully personalized desktops for each user, without compromising on the security and simplicity of centralized management. In other words, we can say that VDI is a variation on the client/server computing model, which is also called as server-based computing.

Are You Ready to Make the Move to the Cloud?
March 8, 2016 - 1:03 PM
It is almost impossible these days to not be bombarded with information about why your organization should be moving not just things like DevOps and email to the cloud but almost "E"verything. This includes truly 'mission critical" applications and capabilities and even security being provided as a cloud service.

DB Networks Identifies Credential Abuse with Machine Learning and Behavioral Analysis
March 7, 2016 - 5:57 PM
Credential identification is one of the issues that is part of the legal battle with Apple and the FBI. The iPhone in question will delete all of the data on the device if the right credential is not used after 10 attempts. Organizations also face similar problems with credential abuse, which have resulted in costly data breaches. DB Networks, a database cybersecurity company, has launched a solution to non-intrusively identify compromised credentials of database communication with machine learning and behavioral analysis in real-time.

Stop Garbage In, Garbage Out: Ensure Data Accuracy
March 3, 2016 - 10:36 AM
Is the famous saying 'Garbage in, garbage out' still relevant? After all, GIGO became a popular term somewhere in the sixties. And with smarter systems and processes there is less 'garbage out'.

Niara's Security Analytics Platform Now Modular and Data-Agnostic
March 2, 2016 - 5:09 PM
Niara is a company known for its innovative security analytics platform, which applies advanced machine learning to data from networks and security infrastructure to automate attack detection from directly within the organization itself. In combination with big data technologies, these machine learning techniques detect and respond to incidents much more quickly while filtering out threats that aren't, well, threatening.

Report Shows Cybersecurity Falls Behind Cloud Service Launches
March 2, 2016 - 4:58 PM
A recent report from Capgemini and RSA found that companies in Benelux, Denmark, Finland, France, Germany, Norway, Sweden, the U.K., and the U.S. have a reputation for under-investing in proper digital security measures.

Cybersecurity: How to Fight Against Cybercrime
March 2, 2016 - 4:36 PM
The world of cybercrime today is not what it once was. It is much more advanced, targeted and aggressive. Now, a 2.78 billion dollar a year industry, cybercrimes have moved from targeting just financial institutions to migrating toward other, not so obvious sectors.

Intel Security Expands Partner System to Fight Targeted Attacks
March 2, 2016 - 1:18 PM
More than 30 Intel Security Innovation Alliance partners have joined the program within the last six months, greatly increasing the number of interoperable security products that converge with Intel Security's architecture. Some of the new partners that have joined the program in this quarter alone include: Aruba, Brocade, Check Point, Forcepoint, Identity Finder, MobileIron, Rapid 7, VMware Airwatch, and Proofpoint.

MetricStream Increasingly Selected by Universities Pursuing Safety
March 2, 2016 - 6:00 AM
A safe university draws interested students, so putting extra focus behind safety is something many universities are turning to.

Hortonworks Unveils Big Data Solutions with Greater Scale
March 1, 2016 - 5:59 PM
Hortonworks Inc. President and COO Herb Cunitz said today in announcing a flurry of news, including what he called the "first set of connected data platforms that allow you to derive actual intelligence from that platform."

Microsoft to Acquire Software Developer Xamarin
February 25, 2016 - 4:00 PM
Xamarin Inc., the rapidly growing San Francisco based software developer, will soon be owned by one of the biggest names in tech: Microsoft. Reports of a deal broke yesterday, placing Xamarin's value between 400 and 500 million dollars. These two companies had already had a working relationship in the past, but this is certainly taking it a step further.

Building Effective SSH User Key Management: Three Best Practices
February 25, 2016 - 3:38 PM
SSH user key and access management can create significant challenges. Organizations usually address them in one of several ways. They may treat SSH issues as an extension of a privileged access management project. They may use a cryptography team that is already managing certificates and other PKI-related issues, or they may treat the challenges as an aspect of their configuration management system processes.

Biggest Story to Watch in High-Tech: Shift to Services
February 24, 2016 - 3:58 PM
The biggest high-tech story to watch is the shift by traditional hardware, software, and platform companies to deliver their offerings as services to business customers and consumers.

Nomadix Upgrades Service Engine to v8.6
February 23, 2016 - 4:17 PM
Nomadix, a manufacturer of Internet gateways, also develops software for its hardware units to help users make the most out of their traffic. The launch of Nomadix Service Engine (NSE) 8.6 works with a handful of company gateways to address the corporate need for guest networks.

The Security Benefits of Data Classification
February 23, 2016 - 3:48 PM
It's said that today's businesses operate in an information economy. If that's true, then data is their hard currency. Intellectual property, customer lists and patents are just a few of the critical digital assets that create business differentiation and must be protected at all costs.

Scale Up Your Defenses Against DDoS Attacks
February 23, 2016 - 11:37 AM
The January 2016 DDoS attack against the BBC may have set a new record. The group that launched the attack, New World Hacking, claims to have reached a top speed of 602Gbps during the attack. Even if the group is exaggerating, there is no doubt that the size, frequency, and severity of DDoS attacks are on the rise. As the attacks scale up, enterprises need mitigation systems that scale as well.

Report: Argentina's BPO/ITO Efforts Now Appear on Track
February 23, 2016 - 6:00 AM
Argentina plans to create 80,000 tech jobs in the next four years and 200,000 over the next eight years, according to an interview with new President Mauricio Macri by Nearshore Americas.

eCommerce Fraud Attempts Growing at Alarming Rate
February 22, 2016 - 3:41 PM
eCommerce merchants clearly need to ramp up their security efforts based on new data found in a global study. The new Global Fraud Attack Index report shows that in 2015, attacks by fraudsters were up a whopping 163 percent, representing a 2.5 times increase during a three-quarter period.

Synaptics Announces New Technology Designed to Thwart Fingerprint Spoofing
February 22, 2016 - 10:55 AM
Understandably, Synaptics does not go into great detail about how this technology works other than it uses something called 'liveness' detection. This would detect the difference between a fingerprint coming from its rightful owner and a fingerprint from an image or copy attached to a finger.

Google Launches Beta Release of Cloud Vision API
February 22, 2016 - 10:54 AM
Google has just released the beta version of Google Cloud Vision API, an application programming interface that grants developers the ability to implement image recognition and classification features into their applications.

Top 3 Tips for Better Password Security
February 22, 2016 - 9:48 AM
Thanks to massive, headline-making data breaches that compromised hundreds of millions of passwords and username combinations, nearly half of adults in the U.S. have now had their personal information exposed to hackers. Today, consumers are more likely to experience a hacked email account than a home burglary.

Top 3 Tips for Better Password Security
February 17, 2016 - 2:54 PM
Cybercrime is more than a mere inconvenience for consumers who lose sensitive information to hackers and companies that have to deal with the fallout of an embarrassing and costly data breach. According to the U.S. Department of Justice, cybercrime is an enormous and growing threat that puts economic prosperity, public safety and national security at risk.

MarketUS Leading the Way on Doing Business with the Government
February 16, 2016 - 4:12 PM
On the face of it, it would seem that doing business with - and reaping the rewards of - the U.S. government would be a no-brainer. How hard can it be? As it turns out, it's quite a challenge.

Solekai Speeds Software Development in Digital Media, Smart Grid, Connected Health and Cloud
February 16, 2016 - 2:29 PM
It is no secret that in our digital, software-centric and connected world, being fast-to-market and fast in the market are now critical success factors. In addition, it is also no secret that in order to literally and figuratively speed things along, companies are outsourcing more and more capabilities to others with deep expertise so that they can concentrate on their core competencies.

NetGen Communications Helping SMBs Go All-IP
February 16, 2016 - 2:22 PM
At the recent ITEXPO East event in Ft. Lauderdale, the buzz around the acceleration of enterprises around the world transforming their communications capabilities to being all IP was palpable. This was true regardless of company size, location and vertical market. It was also evident in every aspect of business and even residential new functionality ranging from personal and premises devices, to and through wired and wireless service provider networks and of course all variations of cloud implementations, i.e., public, private and hybrid.

Getting More Out of Big Data by Leveraging Metadata
February 16, 2016 - 11:27 AM
Every business manager appreciates the need to capitalize on Big Data, and harnessing its power across various lines of business has become the Holy Grail for information technologists. As Big Data repositories continue to scale both in number and size, so does the game-changing potential for organizations to effectively tap into and manage them.

Allot Releases SG-9500 Appliance with Powerful Features for Providers and Enterprises
February 12, 2016 - 9:56 AM
Allot has announced the Service Gateway 9500 (SG-9500) appliance for customers using large traffic networks like enterprises, cloud data centers, and service providers. It will allow such operations the scalability needed for increases in traffic, several powerful security features, and the ability to use analytics for personalization and improved productivity.

DB Networks Enables Advanced Cybersecurity for OEMs
February 11, 2016 - 4:44 PM
There can be little doubt that security is top of mind for C-levels around the world. This pertains to the protection of physical as well as digital/electronic assets. Indeed, in digital domains there has been acceleration in innovative security solutions coming to market. They touch "E"verything-devices, local and wide area networks, data centers, applications and business processes. The goal is to assure that data is protected when it is at rest, on the move and being processed.

VerifyMe's Developer Portal Gets a Version 2.0 Release
February 11, 2016 - 4:27 PM
For communications developers, identity theft, fraud and counterfeiting can be three of the biggest problems on a list that never seems to stop growing. VerifyMe has its finger squarely on that particular pulse, as it's recently released the VerifyMe Developer Portal version 2.0, a system that will readily provide access to VerifyMe's application programming interfaces (APIs).

Hitachi, Pentaho Combine in Huge New Data Center Push
February 11, 2016 - 4:22 PM
The data center is increasingly becoming a company's most valuable chunk of real estate. Providing the infrastructure for network operations, for access to an ever-increasing array of cloud-based services and other functions, it's hard to find more valuable parts of an organization than its data center. Hitachi Data Systems (HDS) and Pentaho have come together once again to light a new spark in the data center.

U.S., U.K. Preparing to Tap British Citizens
February 11, 2016 - 9:53 AM
Edward Snowden and his disclosures have raised the level of awareness about government surveillance in the digital age. The stories that used to get unnoticed or very little press are being highlighted, and most people around the world now have a keen interest to what extent their government will go to violate their privacy, with or without consent.

Cato Networks Launches Network Security as a Service
February 10, 2016 - 3:43 PM
Cato Networks has announced its Network Security as a Service (NSaaS) to enable businesses to secure their networks easily.

The '80/20 Rule' for Standardizing Software
February 9, 2016 - 4:20 PM
When Enterprise Resource Planning software was first introduced to help integrate and streamline the key business functions of an organization, many large companies adopted and licensed the sophisticated software new to this space. They understood that standardizing processes and the software that drives their back-end operations would result in economies of scale, efficiency, and the ability to grow more rapidly. By limiting customization and adopting best practices they could also speed innovation, reduce costly reconfiguration expenses and more rapidly develop markets and their customer base.

451 Research Delivers Intelligence on the Voice of the Enterprise
February 9, 2016 - 3:48 PM
Nikolay Yamakawa of 451 Research sat down with TMC's own Rich Tehrani at the recent ITEXPO in Ft. Lauderdale to explain what his company brings to the table.

Data Science to Benefit from Huge New API Availability
February 9, 2016 - 2:45 PM
Who can doubt the impact that big data projects are having on society? Taking advantage of the rapidly growing heaps of data currently available, big data in all its forms is taking that data and helping businesses and others turn it into actionable insight. Several new applications programming interfaces (APIs) have emerged to help make that a little smoother, and a recent look at the field suggests some of the best ones.

Conjur Launches Version 4.6 of Security Orchestration Software
February 9, 2016 - 12:12 PM
Conjur, Inc. recently announced some new enhancements to its popular security orchestration software, focused primarily on helping businesses transition their infrastructure to the cloud while maintaining integrity and security.

Amazon Web Services Gives Game Developers New Slate of Integrated Services
February 9, 2016 - 12:07 PM
ame development has never had such potential for reward before; today, it's possible for a developer to hit on a concept that could be the next big revolution, and generate huge amounts of revenue. Angry Birds was sufficient for not only a cartoon series but its own amusement park. Minecraft meant $2.5 billion to Microsoft. So game developers are eager to get behind new tools that might help them make the next big game. That's where Amazon Web Services comes in, with a slate of new tools designed to improve performance and help game makers succeed.

Infoblox Combines Threat Intelligence, Network Context with IID Acquisition
February 9, 2016 - 11:32 AM
Network control company Infoblox has enhanced its capabilities through the acquisition of IID, a privately held global cyber threat intelligence company. According to Infoblox, the acquisition of IID is a synergistic move that makes Infoblox the first enterprise-grade DDI (DNS, DHCP and IP address management) vendor that combines contextual network data with federated threat intelligence, along with a dedicated threat research team, to provide context-aware security that uses infrastructure customers already have in place.

Absolute Logic Acquires Cloud9-IT
February 8, 2016 - 3:21 PM
Technical support and consulting firm Absolute Logic has announced that it has acquired Cloud9-IT. The financial terms of the deal for the firm that specializes in serving accounting, dentistry and manufacturing terms in Connecticut and New York.

Cybersecurity Training Center Opens in Boise
February 8, 2016 - 2:22 PM
Crime in the 21st century has transformed as criminal operations have moved into the realm of the digital world. With each passing year, the stakes get higher while the challenge of cyber security gets harder. Cyber Crime Forensics, LLC (CCFTC) has launched the Cybercrime Forensics Training Center in Boise Idaho, to meet the growing need for skilled practitioners in this continuously threatened computing environment.

Protection from Hidden Threats at the Heart of New LGS Innovations Service
February 8, 2016 - 11:54 AM
Data network products are all around us, carrying and often helping to shape network traffic that travels from point to point. Security measures in this widespread base of technologies cover the spectrum, and few even consider the element of device-based source code, much less do anything about it. That has changed with a new product from LGS Innovations. CodeGuardian is the company's product, and it is designed to protect the millions of lines of source code that are found in network switches and routers around the world.

Tackling the SSL Encrypted Traffic Blindside
February 5, 2016 - 2:21 PM
SSL/TLS encrypted network traffic needs to be managed much like an NFL pass rusher. SSL/TLS encryption is widely used to secure communications to internal and external servers, but can blind security mechanisms by preventing inspection of network traffic, increasing risk.

Amdocs Updates Kenan and C1 Solutions
February 5, 2016 - 10:56 AM
For businesses, a lot of the time choosing the right solution means choosing a solution that will receive long term support from the solution's provider. After all, putting the time and effort into choosing a solution only to have to replace it entirely in only a handful of years effectively makes that solution a bad investment. Fortunately for Amdocs customers, the company knows this well.

Synoptek Purchases EarthLink IT Services Division
February 4, 2016 - 3:54 PM
Telecommunications company EarthLink, in an attempt to pare down its business and focus its efforts as an organization, has sold its information technology division to Synoptek.

Greentree Logistics Streamlines Accounts Receivable with VersaPay Automation Solution
February 3, 2016 - 2:07 PM
Greentree Logistics, the brokerage division of the diversified for-hire transportation company Greentree Transportation, recently announced its plan to implement an accounts receivable automation solution from VersaPay Corporation, a company specializing in cloud-based invoicing, accounts receivable management and payment solutions.

IntelliChief Improves Enterprise Content Management
February 2, 2016 - 3:48 PM
Digital technology has rendered paper redundant. The amount of resources it takes to use paper is costly in terms of human and financial capital. In that vein, IntelliChief, a provider of enterprise-class automated document management and workflow solutions, just announced the advanced release of Enterprise Capture, its front-end document capture program that is part of the company's enterprise content management (ECM) platform.

5 Ways Government Agencies in the Middle East Can Fight State-Sponsored Cyber Attacks
February 1, 2016 - 10:35 AM
State-sponsored cyber-attacks strike with shocking frequency. The motives, methods and results of these state-sponsored attacks vary, but the implications are clear: Every organization that stores sensitive information has a proverbial bullseye on its back. Well-funded and extremely efficient, with seemingly unlimited resources and talent at their disposal, state-sponsored cyber-criminals would appear to be an unbeatable foe.

High Performance Computing Market Driven by Investment
February 1, 2016 - 9:35 AM
There are a number of factors pushing the demand for high performance computing to greater heights. Advancements in cloud computing, convergence of big data, development of new technologies and solutions for embedded processors, hot water cooling, and non-volatile memory are meeting the demands of this growing market. High profile companies and governments compete with massive budgets and massive needs.

Transforming Your Business with Fast Data
January 29, 2016 - 10:06 AM
In today's business environment, companies must be ready to analyze and leverage business data that accumulates with every business step they take. Real-time data changes the way companies do business, making some analytics methods obsolete and creating space for new solutions and strategies. It goes without saying that real-time data is too valuable to be ignored. The extent to which companies will be able to benefit from it depends on the kind of resources they already have and their willingness to face new challenges.

Sinequa Expands Smart Connectors for Big Data and Cloud Environments
January 29, 2016 - 9:39 AM
Extracting information from the applications deployed by large enterprises can yield valuable insight. As provider of real-time big data search and analytics, Sinequa has new additions to its smart connectors for cloud and Big Data Hadoop environments.

IHS Report Describes Devastating Costs of IT Downtime
January 29, 2016 - 8:25 AM
IHS recently released a report describing the effects of IT downtime, and the news is not good. In North America, these costs total about $700 billion annually, which is larger than the gross domestic product of all but 20 of the top countries in the world.

Report: Phishing Attacks More Personalized in 2015
January 28, 2016 - 3:08 PM
Wombat Security Technologies recently announced its latest report on phishing attacks, State of the Phish 2016. Among the key results in the report was that these attacks are becoming more sophisticated and personalized in an effort to induce unwary users to click on malicious links and attachments.

MegaPath Further Incentivizes Partners with Top Partner Club Program
January 28, 2016 - 9:52 AM
It seems that the new year is the best time for companies to revamp or retool their partner programs. After all, it's barely been a week since 3CX revamped its PBX Partner Program with more rewards and greater transparency and now MegaPath has made a similar announcement.

Infoblox Reveals the Hidden Value of Core Network Services Data
January 28, 2016 - 9:42 AM
The complexities of today's networks require solutions that are able to keep track of what is happening in the infrastructure at all times. With uptime and reliability the cornerstone of proven service providers, not having a predictable network infrastructure is a sure fire way to lose customers. The Infoblox Reporting and Analytics solutions looks to give operators new insights by unlocking the hidden values of core network services data.

5 Overlooked Secrets of a Successful VDI Global Deployment
January 28, 2016 - 8:33 AM
Before we dive into what you must do before you roll out VDI, let's examine the unique characteristics of VDI.

MRV Receives TMC 2015 Data Center Excellence Award
January 27, 2016 - 2:30 PM
TMC has awarded packet and optical solutions provider MRV Communications a 2015 Data Center Excellence Award winner for its OptiDriver platform.

2015 Was a Big Year for VeloCloud
January 27, 2016 - 2:23 PM
Just yesterday, we heard how VeloCloud was hitting ITEXPO to show off its advances in the field of software-defined wide-area networking (SD-WAN). That alone would be big news, as the company's vice president of marketing Michael Wood joined a panel to show off the rise of the SD-WAN, but hot on its heels is word about VeloCloud's exciting 2015 results.

Accenture EPIC Portal Improves Efficiency via Data Consolidation
January 27, 2016 - 2:19 PM
Global professional services company Accenture has had a remarkable month. So far in January, the company bolstered its cloud services through the acquisition of CRMWaypoint, a supplier of cloud advisory and technology services, followed by an unprecedented collaboration with SAP. Following that up, Accenture has launched a digital portal meant to help product developers accelerate delivery of products to market at lower costs through improved efficiency.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter