Information Technology Editor's Pick

CHANNELS

Subscribe to the InfoTech eNewsletter

Editor's Pick

SSH Keys: Cybersecurity's Largest Blind Spot
July 26, 2017 - 12:14 PM
Picture this plotline from a cyber thriller: Someone self-provisions access to the deepest levels of your network, including all your critical systems. No one notices, and the access never expires. You have no way of knowing who that access belongs to. As if this wasn't bad enough, you learn that this someone has been poking around your infrastructure for the past 10 years. Is your heart racing yet?

Is Your Enterprise Data Secured?
July 21, 2017 - 8:50 AM
In this technological era, every day we have a new system, tool or device at our disposal. However, the ever-changing technology can pose a threat to your information. And most organizations are not very well equipped to handle any sudden threats. This in turn makes your organization vulnerable. The security issues are growing and an organization cannot be maintained without eliminating its system threats.

4 Innovative Ways to Finance Your Startup
July 21, 2017 - 7:00 AM
To avoid putting the cart before the horse, early stage startups need to be aware of all the options available, and when it comes to financing your startup, there are several innovative ways that can help you turn that brilliant idea into a reality.

What Does it Take to Excel in IT Consulting?
July 18, 2017 - 2:30 PM
IT consulting isn't for the faint of heart. Even the most ambitious and confident people can fail in this industry. But there are a select few who find unbelievable success. So, whether you've been in the business for decades or are just starting out, keeping up to date with the latest consulting best practices allows you to remain competitive and continue providing exceptional service to your clients.

Virtualization Detection Techniques Used By Malware
July 17, 2017 - 7:00 AM
The WannaCry malware outbreak isn't even over yet, but another new malware, Petya, has surfaced. Both of these malwares make use of vulnerabilities in the Microsoft Windows operating system. The vulnerabilities, namely ETERNAL BLUE and DOUBLE PULSAR, are believed to have originated from the NSA and were released by the group The Shadow Brokers earlier this year.

Three Ways to Generate Profit with the Data You Already Have
July 14, 2017 - 1:38 PM
Build it and they will come. That is the view many organizations maintain about their data lakes and data warehouses. Companies are rapidly investing in systems and processes to retain business data that they know is valuable but have no clue what to do with it.

5 Best Skills for a Data Technician
July 14, 2017 - 12:12 PM
Are you looking to become involved in big data by becoming a data technician? As big data companies continue to grow, data technicians will become even more in demand. To be successful in this field, they will be required to learn a variety of skills that could give them an edge over others. In this article we will be discussing the five best skills for a data technician to have.

24.7.365 Availability Keeps Customers Loyal
July 13, 2017 - 11:09 AM
The lightning-fast pace of technological innovation is forcing organizations to change the way they operate or risk falling behind. As IT leaders and analysts say, every company is now becoming a software company.

10 Critical Apps to Grow Your Business
July 11, 2017 - 3:28 PM
Entrepreneurship is a grand adventure: daunting, thrilling, and a lot of hard work. As you grow your business, it's easy to take on too much and to let key tasks slip through the cracks. The No. 1 way to stay on top of your game and scale effectively is to get organized!

The Most Advanced Big Data Streaming Systems
July 11, 2017 - 8:35 AM
Big Data sets are often created by the collection and parsing of streaming data, which is the name given to digital information that is generated and collected on a constant basis from a considerable number of sources. The data records streamed are often small enough to be measured in kilobytes, and they tend to conform to prearranged structures.

6 Items Your Help Desk Wish They Had
July 10, 2017 - 3:19 PM
Could your help desk use a little help of their own? It's very likely, but it's also common for help desk employees to be entry-level and uncertain about asking higher ups for an upgrade. However, making sure your help desk is kitted out with all the tools they need for success means that will trickle down to your customers. A happy, high-tech and smoothly operating help desk is a must for most companies. Unfortunately, it's often overlooked.

Why the Era of Automation Will Still Require the Human Experience
July 10, 2017 - 2:38 PM
The current era of automation presents the opportunity to eliminate mundane and repetitive tasks, taking many thankless chores off of workers' plates. Increasingly, discussions of automation, artificial intelligence and machine learning technologies assuming roles like driving, stock trading, telemarketing and manufacturing are making headlines. This trend is leaving room for a new kind of productivity in the workplace-and likewise, a new way of valuing human capital.

SSL Encryption: Clearing Common Misconceptions
July 10, 2017 - 10:24 AM
The amount of Internet traffic secured via SSL encryption is surging to new heights every day - it's estimated that nearly 70 percent of all Web traffic uses SSL encryption and 86 percent of that uses advanced encryption methods like Elliptical Curve Cryptography (ECC) and Perfect Forward Secrecy (PFS).

VAT Introduction is the Case for e-invoicing & e-archiving
July 10, 2017 - 7:00 AM
VAT will transform the way trading companies across the GCC conclude business transactions - be it an SME/ SMB or a large enterprise. It is the case for IT solutions, such as e-invoice suite and e-archive suite, to ensure a smooth transition to the new tax landscape and guarantee on-going VAT compliance.

NotPetya: The Ransomware that Spreads Like a Worm
July 6, 2017 - 8:00 AM
Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.

GoldenEye Ransomware Highlights Importance of Eliminating Network Blind Spots
July 5, 2017 - 2:16 PM
A wave of ransomware swept across Europe at an incredibly rapid pace, grinding business to a halt at banks, airports, pharmaceutical companies, government offices, service providers, utilities and more, security researchers said.

13 Best Practices for Eliminating Insider Threats
June 28, 2017 - 9:20 AM
Protecting your network from insider threats is just as important as defending against external ones. These 13 practices can help deal with these risks.

Common Problems Affecting Website Performance & How to Counter Them
June 26, 2017 - 4:05 PM
A website's performance varies for a number of reasons. Conducting stress tests, ramp tests and load tests as a performance checkup can create a clear image of the problem and provide insight into how to counter it effectively.

Best Free VPNs to Bypass Internet Throttling
June 21, 2017 - 2:33 PM
Back in the day, Internet throttling was only brought into play when it was needed. However, people are now downloading and streaming content almost all the time, which has led to an increase in their bandwidth consumption.

What to Ask Before your Company Invests in IT
June 20, 2017 - 1:54 PM
Seeking out the proper technology for your business needs is a difficult, and at times, frustrating task. When faced with a wide variety of options, business executives or owners may think that the best way to solve a problem is by using a company that provides a temporary IT employee. Unfortunately, this is only a Band-Aid solution, and once that employee's contract is up, the company is on its own, and, quite possibly, right back to where the trouble all started.

Four Reasons Why Microsoft is Losing the War to Secure O365
June 19, 2017 - 3:42 PM
According to Microsoft's own reports, it is about to surpass 100 million users on the O365 environment. That is almost 100 percent growth from a year ago. When there are that many users on any system, there are bound to be issues.

Five Essential Skills for a Career in Tech
June 19, 2017 - 2:50 PM
While research has shown that tech jobs are growing, why has there been such a push? Aside from the excitement surrounding innovation, technology careers seek to provide answers for problems that we all face in business and daily life. If you would like to be a part of a career that tackles these challenges directly, here are five important qualities to highlight when applying and interviewing.

The Ethics of Data Retrieval and Storage
June 14, 2017 - 9:14 AM
There are many companies making a lot of money in the big data industry. This has a variety of benefits for companies. Not only do they get to know customers better, but big data can be used to predict future behavior as well.

Lepide's Predictions for Ransomware in 2017
June 9, 2017 - 11:16 AM
Unfortunately, chances are that ransomware attacks will evolve to become even more malevolent than they already have been. New strains of ransomware will explode onto the scene, with greater scope, reaping even greater rewards. Infiltration and propagation methods will be ever-more stealthy and insidious.

Teaching Your Staff How to Use a Cloud-based ERP
June 9, 2017 - 10:00 AM
When it comes to implementing enterprise resource planning (ERP) software, managers often believe that the most important part of the process is choosing the vendor and software suite that best fits their needs. This is extremely important, of course, but the argument can be made that even the best ERP software is borderline useless if the end user doesn't understand how to operate it.

Is Third-Party IT Maintenance Better Than OEM?
June 8, 2017 - 8:38 AM
Most pieces of hardware come with an original equipment manufacturer (OEM) contract that covers various repairs and maintenance. It's simple, reasonable in cost, and effective, but many businesses don't realize there's another alternative in the form of third-party contracts. Instead, they stick with their expensive, "default" OEM contracts, and miss out on the potential advantages that third-party maintenance offers.

The Conundrum of Storing Our Data
June 6, 2017 - 4:45 PM
Big data presents a significant opportunity for companies. It can be used as a means to increase efficiency in a factory, produce leads for new customers and even forecast sales for products months or even years into the future.

New Netwrix Tool Improves IT Performance
June 2, 2017 - 1:08 PM
A new free tool from Netwrix, the Netwrix Auditor Free Community Edition, offers a simple, cost-effective way to maintain the network.

Which Managed WordPress Host is Right for You?
May 30, 2017 - 2:38 PM
If you've decided that Managed Hosting is perfect for you, the next step is choosing the right host. This can be a tough job - all hosts look very similar and the websites are full of technical jargon. So, how do you find a good one?

Do You Need Managed WordPress Hosting?
May 30, 2017 - 2:36 PM
No doubt about it, WordPress is one of the best ways to build a website. But how much thought did you give to choosing your Web host?

A Look at the Rise of Freelancing in the IT World
May 30, 2017 - 9:42 AM
There are lots of benefits associated with being a freelancer. Not only do you get to work remotely and set your own schedule, but you can also pick and choose clients and jobs based on what interests you. But do you know how to get started as a freelance IT pro?

WannaCry is Part of a Bigger Problem
May 26, 2017 - 2:30 PM
The vulnerability exploited by this attack had been patched by Microsoft months before. That patch was part of a widely publicized update that was issued in response to the massive set of NSA cyberespionage tools leaked by the secretive group known as Shadow Brokers. Everyone knew about it. Yet, apparently, few did anything about it.

Ensuring Business Continuity When Your SaaS Stops Providing the Service
May 25, 2017 - 8:51 AM
The hard truth is that there are some cloud security concerns. And the reliability of your SaaS provider is probably the biggest one. The main thing you want to avoid is a situation where you're manically searching for an exit strategy, making decisions on what you can afford to lose, knowing that you won't have enough time to salvage everything.

Important Features to Consider for Windows VPS
May 25, 2017 - 8:29 AM
Virtual Private Servers (VPS) are one the most beneficial and widely used programs in the world. They are ideal to use for Web hosting, secure mail servers, virtual desktops, or for running critical applications.

Do VPS Make You WannaCry?
May 23, 2017 - 3:38 PM
Virtual Private Servers (VPS) have had a rocky start to their creation. Although the technology exists, the security concerns have kept VPS from having a wider acceptance. Recent computer security hacks, such as the WannaCry ransomware attack, have given small business operators pause.

How SMBs Can Safeguard Against Phishing Attacks
May 22, 2017 - 6:03 PM
The reality is that phishing is one of the most effective cyber attack vectors used today, and SMBs are scrambling to figure out the best way to handle it. While user training is necessary, it's not sufficient. Each business has a diverse set of roles, which gives attackers a range of targets to gain access to company systems.

How to Make Big Data Analytics Efficient for Business Growth
May 19, 2017 - 9:10 AM
Big data analytics analyzes millions of data points to derive meaningful patterns and information that businesses could use. According to one study, at least one third of all data that is generated will pass through the cloud. IDC suggests that the total data generated at this point would be nearly 40 trillion gigabytes. Given this ocean of data to play with, how do businesses make use of technology to boost their growth? Here are a few ideas.

What Are the Biggest Threats and Priorities Facing the Banking Industry?
May 15, 2017 - 4:25 PM
It probably isn't news to anyone that the financial services industry is a major target when it comes to data breaches, accounting for 35 percent of all data breaches and weighing in as the No. 1 most breached industry, according to the Verizon 2016 Data Breach Investigation Report.

Here's Why Every Business Needs a File-Sharing Policy
May 11, 2017 - 4:27 PM
Sharing data, files, and other important information is a major part of today's digital business world. Between email, VoIP phone calls, cloud software programs, and everything else that your business needs on a daily basis, it's impossible to avoid the exchange of information. But if you don't have a secure strategy in place, you're just asking for trouble.

How is DevOps Adding Value to Business Productivity?
May 11, 2017 - 9:19 AM
In this article, we will discuss the benefits of DevOps for small and medium scale enterprises.

Netwrix Auditor 9.0 Offers Quick Response to Ransomware
May 11, 2017 - 8:45 AM
The release of the new Netwrix Auditor 9.0 addresses new security threats by introducing functionalities that will allow organizations to respond quickly to ransomware and insider vulnerabilities.

How to Future-proof Your Security Operations
May 10, 2017 - 4:48 PM
Security Operations Center (SOC) teams face anywhere from 50 to 100,000 threat alerts a day, many of which are false positives. Even the most sophisticated teams struggle to combat the sheer barrage of information and alerts they must sift through daily. Not only can alerts and events be hard to prioritize and manage, but real-time detection continues to be a major challenge as many sophisticated adversaries use "living off the land" techniques to blend in as insiders. One thing is clear - SOCs need to continue to evolve in order to keep pace with modern-day threats. And, utilizing the right combination of technology, intelligence, and people is critical to this evolution.

Studies Illustrate Growing Cybersecurity Threats
May 10, 2017 - 4:36 PM
A large and growing collection of headlines and reports remind us of the growing cybersecurity problem. Here's a look at a few statistics and forecasts from some of the latest studies on this front.

Security Platform vs. Security Fabric
May 9, 2017 - 10:44 AM
One of the challenges many organizations face when considering upgrading or expanding their security infrastructure is simply wading through the sometimes-confusing language and nomenclature being invented by security vendors and manufacturers to describe new technologies and strategies.

From the System of Record to the System of Intelligence
May 5, 2017 - 4:15 PM
The 1990s legacy vendors of ERP were long considered best in class, the cutting edge. But now organizations approach to ERP needs to evolve. Today, in the age of artificial intelligence and machine learning, organizations can do better than running a system of record. They can run a system of intelligence.

The First Step to Digitalization and Efficient Document Capture
May 3, 2017 - 4:22 PM
The goal of document imaging is to capture and share information visually, so clarity in all resulting formats is critical. What you capture is what you will wind up seeing, sending, and printing. Capturing reality (and possibly enhancing it without modifying it) is crucial.

Cyber Crime Alert! The Rise of Exploit Kits
May 3, 2017 - 12:05 PM
Cherif Sleiman, VP EMEA at Infoblox, discusses the increasing prevalence and risks posed by exploit kits, the evolution of this threat and how companies can defend against them.

The 5 Biggest Pain Points IT Pros Deal With
May 2, 2017 - 8:41 AM
It's a good time to be in the information technology field, but that doesn't mean the industry is void of issues. With new advancements come new issues that must be dealt with in a head-on fashion.

Tools and Resources That Will Aid in Business Growth
April 27, 2017 - 9:28 AM
While fast growing businesses have the potential to be tremendously lucrative, lacking the tools, technology and resources needed to deal with the specific complications and obstacles that expansion may create can quickly become a major liability.

Waze or MapQuest? When it Comes to the Internet, Traffic Routes Matter
April 26, 2017 - 4:39 PM
Let's say you operate a large chain of retail stores. Would you rather your customers use Waze or MapQuest to get to the store closest to them? Clearly you would rather they use Waze; otherwise they might find themselves stuck in traffic and decide in frustration not to go to your store at all. When it comes to online businesses, the situation for your customers is quite similar.

Study: Mid-Tier Businesses Need Security Services
April 26, 2017 - 11:14 AM
Mid-tier businesses are spending a large and growing amount of their budgets on security - especially network security, according to a new study conducted by 451 Research. And the study, which was commissioned by security-as-a-service provider OPAQ Networks, suggests that the majority of these companies want and need security as a service to help them manage this financial burden.

The Importance of Responsive Design for New Websites
April 25, 2017 - 2:37 PM
The usage of mobile phones has exploded in recent years. Most people now have a cell phone that they use for everything from calling to watching movies. These phones are an essential part of everyday life. Since they are so handy, people are using them more often to access the Internet, which has brought about some issues.

What's the Appropriate Response After a Security Breach?
April 24, 2017 - 10:06 AM
A security breach can be a nightmare for businesses of all sizes. And while there's a lot of information on how to avoid a breach in the first place, there isn't always clear advice on what to do after one has already happened. From an IT perspective, a swift and calculated response will play a key role in diffusing the problem and rebuilding trust.

Four Must-Haves for Your CPQ Software Upgrade
April 17, 2017 - 2:43 PM
Exactly what is CPQ software, and why do you have to upgrade it? Also known as configure price quote, it's a software solution for sales teams that quickly analyzes data to offer the best, most accurate numbers in seconds or minutes (depending on the amount of numbers to crunch). It's taken the place of sales teams going in the back to "talk to the manager" in an age when customers want and expect information in real-time. It also removes human error, encourages customer loyalty, and makes closing the deal a lot easier on your sales team.

Five IT Trends Sure to Impact Small Business in 2017
April 13, 2017 - 9:09 AM
Now that we've finally escaped the shadows of last year and have progressed into 2017, we can look at some of the trends that are taking place and use them to more accurately predict what will happen this year. With that being said, here are a few of the IT trends that are sure to have an impact on small businesses in the coming months.

Why Businesses Must Co-opt Shadow IT
April 13, 2017 - 9:02 AM
Denial has proven futile. Once just a worrisome trend, shadow IT has grown into a monster. The aptly named phenomenon, a known risk of data breaches and financial liabilities, pits information technology professionals against end users in an endless battle for control of the digital workplace environment.

Closing the Paperless Billing Gap
April 12, 2017 - 5:03 PM
In today's real-time, always-on culture, users want to receive important documents faster than ever. Whether bank statements, healthcare records, or even legal documents, consumers want information at their fingertips. As a result, electronic, or paperless, billing has emerged as a viable solution to the need for speed in information delivery.

Online Activism: DDoS and Cyberattacks as Peaceful Protests
April 11, 2017 - 1:35 PM
While distributed denial of service attacks generally get nothing but negative attention due to the damage they can do to websites and businesses, activist or hacktivist groups around the world are taking these attacks in a wildly different direction: the peaceful protest.

Document Digitization in the Middle East: On the Road to Digital Transformation
April 10, 2017 - 8:53 AM
For many companies in the Middle East, the biggest challenge when establishing a digital transformation strategy is to determine when and how to digitize paper documents. The decision-making process needs to factor in the requirement to scan legacy files, as well as put processes in place to capture all newly created or acquired information quickly and efficiently.

3 Tips for SMBs in the VDI Market
April 7, 2017 - 11:05 AM
In today's modern workforce, employees are just as comfortable meeting in coffee shops as they are in conference rooms. Small- and medium-business leaders see the need to support employees who work outside the confines of the physical desktop or office, offering the flexibility to work from any location. IT must be just as flexible to meet the changing needs of growing numbers of workers.

Taking Manufacturing into the Future
April 5, 2017 - 11:34 AM
According to a report released by consulting firm McKinsey and Company, the next ten years should see the rise of digitalization as the fourth era of industrial revolution begins. What is the fourth industrial revolution, also known as Industry 4.0? How will it affect the manufacturing sector?

Five Lessons Learned While Preparing for Our SOC 2 Audit
April 3, 2017 - 10:15 AM
OutSystems recently went through a successful SOC 2 (Service Organization Control) audit of security controls to demonstrate compliance and our ability to protect sensitive customer data. As that is something organizations are increasingly asking of vendors, knowing five key tips will help ensure a smooth audit.

Cybersecurity Landscape: Putting Threats into the Context of Technology Infrastructure Trends
April 3, 2017 - 9:51 AM
Organizations today are facing cybersecurity challenges that are multi-faceted, with a threat landscape that is rapidly evolving. Threats are intelligent, autonomous and increasingly difficult to detect, with new ones emerging and old ones returning with enhanced capabilities.

Why is Smart and Secure Remote Access Underestimated?
March 29, 2017 - 8:28 AM
For too many IT departments, the power of remote connectivity is underestimated much like these remaining players in the most exciting basketball tournament in the world. In his most recent blog, Mike discusses the three key attributes that IT managers should demand of a remote access solution. Before you choose your communications solution, make sure that the provider's connectivity into your enterprise is smart, secure and gives you full control.

Three Reasons Your IT Team Needs VoIP
March 28, 2017 - 1:38 PM
VoIP or Voice over IP is especially useful when businesses want to gain and use communication to different areas all over the world. In most cases, voice communication is expensive. Making phone calls to people on the other side of the world, for example, can be very costly for businesses. However, VoIP has been shown to offer many advantages to businesses related to cutting the costs of calls. The feature also provides many other benefits to companies.

Leave Competitors Behind by Using IT Solutions to Analyze YouTube Videos
March 28, 2017 - 10:15 AM
Today, people tend to upload their video reviews of different products and services to such websites as ExpoTV and YouTube. The latter is the best example of websites that often get too little attention from marketers and researchers given difficulties associated with the analysis of video content.

Technology Purchasing Sees Shakeup in Organizations
March 27, 2017 - 10:29 AM
A new IDC update reports that there will be many more technology purchases made from line of business budgets than from IT operations.

ARM's DynamIQ Bolsters AI, Cloud Applications
March 24, 2017 - 3:08 PM
ARM's latest chip design, the DynamIQ, means some substantial advances ahead in cloud applications, AI processing, and more.

What Color is Your Network? Best Practices for Automation and Orchestration
March 21, 2017 - 8:12 AM
Digital transformation waits for no organization. According to recent research, organizations have one or two years at best to make significant inroads in this area before they suffer financially and competitively. Creating widespread change usually involves overcoming thorny challenges, and among them is "technical debt." This phrase, borrowed from programming, conjures up the idea of technology that makes change harder. It shows up in three main ways.

How Online Services Help Improve SEO
March 17, 2017 - 2:50 PM
One of the best ways to improve SEO performance is through suitable customer service.

Digital Signage Design Ideas for WordPress Sites
March 17, 2017 - 11:49 AM
For those with a strong foothold in digital signage, WordPress provides the perfect dynamic platform. Compared to other digital sign products, WordPress provides a cost effective, open source alternative.

Pennsylvania Sues IBM Over IT Project
March 16, 2017 - 12:20 PM
Pennsylvania is suing IBM for what the commonwealth says is incomplete work on an IT project that promised to upgrade its unemployment compensation system. But what's truly interesting about this case is what it illustrates about such large engagements - that only 2 percent of development projects that exceed $100 million in labor costs are on time and within budget.

Email Viruses Infect Millions: What Happens If You Get One?
March 15, 2017 - 10:14 AM
Since the dawn of the Internet, there have always been security risks and measures in place to prevent damaging attacks. But what happens if your software misses it, a user makes an error and clicks on the wrong link, or downloads a virus disguised as an attachment? Are you protected? What can you do to mitigate the risks and prevent viruses from wreaking havoc on your systems?

How Remote IT Workers Can Thrive and Survive
March 14, 2017 - 2:12 PM
While IT professionals were once confined to working on the job site, the transition to virtual servers and cloud technologies now means many businesses are hiring remotely. This is great from a convenience perspective, but can be troublesome for those who have no experience working remotely in the past.

Seven Key Elements to Include in Your Start-up's Business Plan
March 14, 2017 - 10:50 AM
Whether you're looking to attract angel investors or gain the attention of venture capital firms, you'll need a well-crafted summary of your business and how you desire to run it. Sadly, around 50 percent of start-ups fail within their first four years. Many of these failures could have been avoided if more energy was poured into creating a strong business plan. The plan is the blueprint for your start-up and its crafting should be treated with the utmost care. But in order to write a quality business plan, you'll need to know what key elements comprise it.

March Madness for Vulnerabilities
March 14, 2017 - 10:26 AM
March Madness, the annual college basketball championship, is here! Whether that means gearing up for the basketball tournament or getting ready to face spring and summer seasons, this is the beginning of a very busy time for a lot of people and organizations. The problem is, it's a busy time for hackers as well.

How Does Email Security Fit into Your IT Strategy?
March 13, 2017 - 2:33 PM
It's up to you and your IT partners to strengthen your security fence and manage the way you use email.

The Row-Level Security Secrets All DBA Experts Should Know
March 10, 2017 - 9:24 AM
We love the SQL Server 2016, and for more than one reason. The 2016 version came with a number of added features and upgrades to its existing features that enhance the SQL Server security aspects like never seen before. One of the newest features of the 2016 version is Row-Level Security.

What is SSD? The Beginner's Guide
March 9, 2017 - 12:31 PM
How ancient do the ideas of floppy disks and CD-ROMs seem? Incredibly, people still use them in some parts of the world, despite the fact that one 16GB USB memory stick offers storage equivalent to 11,000 floppy disks. Those same memory sticks themselves pale in comparison to some flash drives, offering up to several terabytes of space.

How to Make Your Web Design Campaign Successful
March 9, 2017 - 11:21 AM
A successful Web design campaign does not happen easily. Lots of effort, a high intelligence level and creative thinking need to be integrated to reach the target.

Is Your Business Ready for the Internet of Things?
March 8, 2017 - 9:58 AM
The explosion of connected devices, and the increasing number of businesses embracing them for mainstream operations, has meant that analysts are now estimating that over 20 billion "things" could be circulating by 2020. But, how will it transform business as we know it?

TMC Announces Winners of the 2016 infoTECH Spotlight Data Center Excellence Award
March 7, 2017 - 11:24 AM
The 2016 infoTECH Spotlight Data Center Excellence Award recognizes the most innovative and enterprising data center vendors who offer infrastructure or software, servers or cooling systems, cabling or management applications.

Three Reasons Why Silicon Valley Will Outsource to Belarus
March 2, 2017 - 2:31 PM
When it comes to IT outsourcing, the facts talk even louder than numbers. Silicon Valley, desperately trying to fill the gaps in the IT talent pool, has already been caught among the leaders of H-1B Visa claimers. IBM, Microsoft, Google, Facebook, Amazon and Apple are all among the top 20 companies inviting IT professionals from overseas.

It's Up to IT to Usher in the Smart Office
March 2, 2017 - 11:30 AM
We've all heard of the smart home. In fact, most people already have one or two smart technologies installed in their home. Some have fully invested in advanced gadgets and tools to further automate simple processes. But are you familiar with the smart office? It's the next frontier for smart technologies and it's up to IT departments everywhere to make it a bigger priority.

What Makes Computer Software Secure?
February 23, 2017 - 2:48 PM
During the planning stages of software development, it's important to think about all possbile security flaws and how you can come up with ways to protect your software. If you concentrate on the following points, then your software will be as secure as possible.

5 Ways to Attract Angel Investors for Your Tech Startup
February 22, 2017 - 10:04 AM
Angel investors typically cannot put up as much money as venture capital firms, but offer an incredible amount of intangible benefits to tech startups, such as one-on-one mentoring. Angel investors typically invest in people rather than ideas, and wish to build lifelong working relationships with serious professionals.

Teramind's New Feature Detects Insider Threats
February 21, 2017 - 8:58 AM
Teramind has announced a new patent pending intelligent session mining feature to help organizations identify insider threats and to expand its partner program by helping value added resellers (VAR) and managed service providers (MSPs) increase their bottom line.

You Can Now 3D Print Electrical Circuits
February 14, 2017 - 2:03 PM
A company called Nano Dimension recently announced that it has successfully printed 3D electrical circuits. The team was even able to embed electrical components inside the circuits, during the printing process. So, the circuits are totally usable.

A Love Letter to the Excel Spreadsheet
February 14, 2017 - 7:00 AM
Just in time for Valentine's Day, here's a little tribute to the business application we've all been devoted to for so long.

A Look Back at Project and Portfolio Management for 2016
February 13, 2017 - 2:21 PM
Last year's findings revealed some interesting takeaways, indicating some "trends" that are here to stay, and others that are on the rise.

Market Consolidation: Who Are the Winners and Losers?
February 13, 2017 - 9:41 AM
It is common to see smaller companies in the IT market accept VC funding or get acquired by bigger players, and for many, it's the end goal. In the IT automation space alone, market consolidation has played out time after time - with behemoths such as CISCO, IBM, BMC and CA Technologies acquiring smaller, niche players. The latest of these announcements came in January 2017 when CA Technologies finalized its acquisition of Automic.

Here's Why Data Backup and Recovery Needs to be a Focal Point
February 13, 2017 - 9:23 AM
You may assume it'll never happen to you, but all it takes is one attack, natural disaster, or honest error and all your company's data could vanish. That's why you absolutely must have a backup and recovery plan in place.

3D Printing New Crimes: What Police Need to Know
February 13, 2017 - 8:56 AM
3D printing has the potential to transform the world by simplifying manufacturing, shortening supply chains, democratizing production, creating jobs, and customizing products to our needs. But 3D printing also has a dark side. Guns have already been 3D printed and criminals are using 3D printers to create new forms of crime.

Empowering Higher Education to Empower Students
February 9, 2017 - 9:01 AM
Most higher education institutions seek to prepare their graduates to be "work ready", so it's no surprise that many of them have incorporated Linux-related content into their curricular programs. As the popularity of Linux in modern IT has grown, so has the demand for Linux and related skills in the job market. But building these courses so they match the expectations of enterprises, keeping them up-to-date as technology rapidly evolves, and properly supporting them with hands-on labs and exercises can be a complex, difficult, and costly undertaking. This is why we created the Red Hat Academy.

Password Integrity Shouldn't Be Taken Lightly
February 7, 2017 - 9:52 AM
For all the discussion about malware, phishing, ransomware, and other common threats, it seems like most IT departments around the country are failing to account for one of the more prevalent issues: password-based attacks.

Ransomware: How to Prepare for and Recover from Attacks
February 2, 2017 - 11:58 AM
Ransomware - a malicious program that infects and locks up files on devices until a ransom is paid - is a growing problem across all industries. Experts say the total cost of ransomware attacks could reach $1 billion in 2016, and the danger is expected to increase sharply in the years ahead. A recent Osterman Research survey of more than 500 IT professionals at businesses in North America and Europe found that almost half had been the target of a ransomware attack.

Data Breaches Are Costing Victims Big
February 2, 2017 - 11:49 AM
We all know some of the ancillary costs of data breaches. The loss of face in the community, the loss of faithful customers who no longer believe a company safe to work with, the loss of time spent repairing a system and augmenting it to face future breaches are all a part of the package.

Email Archiving Laws Are Changing - Are You Complying?
February 1, 2017 - 11:54 AM
Many industries are effected by laws regarding the archiving of digital documentation. Some industries only need to archive for a year, while others may need to archive everything for an entire lifetime. If you would like to learn how archiving laws effect your industry, take a look at this Guide to Email Retention Policy.

Data Management Platforms: Nailing the Implementation
January 31, 2017 - 8:10 AM
So now that you've acquired a data management platform (DMP), it's now time for you to set it up. A DMP implementation is a very iterative process, so you'll need to prepare in advance. Some components of the implementation may be complete before others, and that is perfectly normal. A successful implementation will be revisited and tweaked to ensure long-term relevance of the tool.

Microsoft by the Numbers: Ups and Downs
January 27, 2017 - 10:47 AM
Microsoft's latest earnings report reflects good news and bad as some categories rise and others plummet.

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter