Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

DataCore and Curvature Team on SDS Offering that Integrates with Legacy Storage Solutions
August 28, 2015 - 2:04 PM
An important new partnership has been forged in the software-defined storage (SDS) space, a market that has been steadily gaining traction. Infrastructure and services provider Curvature has teamed up with SDS specialist DataCore to help large organizations better control their data center storage devices and costs.

Accenture's Winner's Circle Designation in Procurement Technology is a Sign of Industry Maturation
August 28, 2015 - 10:42 AM
Accenture recently announced that it had received 'Winners Circle' recognition for its procurement-as-a-service (PaaS) solution from HfS Research. The designation is the result of input from more than 1,100 responses from industry analysts, BPO buyers, service providers and stakeholders.

Survey Reveals That People Want to Completely Replace Passwords
August 28, 2015 - 9:30 AM
LaunchKey, a company that has made a name for itself as a mobile authentication platform released the findings of recent survey earlier this week. That survey found that password-based authentication is not capable of meeting demands of information security. Because of this factor, the survey found that a massive 84 percent of respondents are in support of throwing away the practice of passwords altogether.

BlueData Receives $20 Million Funding, Will Collaborate with Intel on Big Data Project
August 28, 2015 - 6:00 AM
BlueData recently announced that it had received $20 million in Series C funding led by Intel Capital, a VC division of Intel Corporation. Both Intel and BlueData will collaborate on a business strategy aimed at simplifying big data deployments.

How Adam Schefter's Accidental ESPN Firing Could Have Been Avoided
August 27, 2015 - 5:41 PM
At one of my previous places of employment, a senior executive once fired his new employee who had uprooted his family to move to a new city to pursue the opportunity he was currently in. Luckily, it was not real - it was just the worst April Fool's joke in history.

5 Tips on How Proxies Can Help Your Business
August 27, 2015 - 5:39 PM
Protecting your business's servers is likely one of your top priorities, especially if those servers contain sensitive customer information. Top security experts know that one of the best ways to protect a server is through the use of proxies, which block direct access to the network. But how do small businesses put this technology to use on their own networks?

Recent Court Ruling Grants FTC Power to Regulate Cybersecurity
August 27, 2015 - 3:46 PM
A recent U.S. appeals court ruling granted the FTC explicit power to regulate cybersecurity, citing the lack of legislation governing this area and the FTC's innate and broad authority to protect consumers from unfair and deceptive trade practices.

Amazon Bans Flash Ads Starting in September
August 27, 2015 - 12:24 PM
Amazon announced earlier this week that the company would no longer allow Adobe Flash on its website. The e-commerce giant announced that the change will be taking place rather quickly, going into full effect on September 1. The firm says that the ban is an effort to make sure that all of its customers have consistent experiences when they visit the website.

A Look Back: How to Optimize IT Project Management with the Help of Retrospective
August 27, 2015 - 10:05 AM
Imagine a group of people watching a movie and then discussing it; you'll often find the discussion to go beyond what happened at the surface of the movie. This is how a retrospective works in IT.

The Power of Two: Network and Application Visibility are Better Together
August 26, 2015 - 3:41 PM
I bet you don't need more than one hand to count the number of seconds that pass between the onset of an application or network performance issue and the arrival of the first IT helpdesk ticket . . . or irate phone call. However, identifying the exact cause of the service degradation often takes a little more time and effort.

Tractica: Computer Vision Technology Making Big Gains in Short Term
August 26, 2015 - 1:24 PM
Computer vision technology-which involves turning image and/or video sequences into quantifiable data-isn't a commonly-considered technology, but if word from Tractica pans out, it will be in the near-term future. Tractica's newest report suggests that growth for computer vision technology is set to be strong over the next few years, and as such, around 182.7 million devices that incorporate computer vision in operations will be shipped annually by 2019.

How Smart CIOs Select Integration Platform as a Service (iPaaS) Providers
August 26, 2015 - 11:35 AM
Disruptive shifts in corporate IT are changing the game for the modern CIO, and the implications of this transformation are especially apparent when it comes to integration. There has been a proliferation of integration solutions and vendors hitting the market, and the responsibility of choosing the right one for his or her company falls squarely on the shoulders of CIOs.

New Operating Model Enables Companies to Compete in the Digital Age
August 26, 2015 - 10:38 AM
Competitiveness in the digital age is upending the way that many companies have operated for decades. Products and services used to enjoy a much longer lifecycle than the innovations brought to market today. Market cycles as short as just a few weeks are common.

Crowdsourcing Enterprise Knowledge: Applying Crowdsourcing to Internal Company Resources
August 26, 2015 - 7:23 AM
One of the most widely regarded standards of crowdsourcing is from Jeff Howe's book, where it's said that no company has all of the smartest people working for them. Perhaps; but most companies of any size have an impressive roster of skilled people. That's how they became successful! And in various ways, companies use crowdsourcing every day to access some of the best technology researchers in the world.

Mirantis, Intel Announce OpenStack Partnership
August 25, 2015 - 3:36 PM
Mirantis has announced a partnership with Intel to promote the OpenStack cloud platform with both technology and financial investment.

Delivering Updates with the Least Amount of Effort: A View from the Inside
August 25, 2015 - 2:53 PM
Be it a major functionality release within a product's core evolution or a security issue fix, frequent delivery of updates to all corporate clients is fraught with risks and almost implausible without continuous delivery tools and proper mindset. My goal for this article is to share some best practices for establishing effective updates during the delivery process on an as-needed basis with as little pain as possible.

Is Your VPN Made Vulnerable by WebRTC?
August 25, 2015 - 9:12 AM
The reality is we're in an age where many of us will trade some of our privacy for access to better deals, more personalized offers and even seamless connectivity with the companies with which we do business and want to communicate. Too often, however, we take these risks without fully understanding what we're giving up in the process.

Credit Card Sized Computers and Captain America: Perfect together!
August 24, 2015 - 3:41 PM
New small form factor computing platform set to disrupt data centers usage by SMBs.

Intel's Rack Scale Architecture Demonstration Features PCIe Storage Switches from PMC
August 24, 2015 - 11:23 AM
PMC, a provider of enterprise and data center solutions for networked and server storage applications, recently demonstrated the advantages and capabilities of its Switchtec PSX PCIe Storage Switches at the Intel Developer Forum. The Switchtec PCIe switching architecture was presented as an industry partner solution in the Intel Rack Scale Architecture (RSA) demonstration.

Windstream Has Entered into HP's PartnerOne Program
August 21, 2015 - 3:50 PM
In an effort to become even stronger in the cloud-ready solutions field, Windstream recently announced that it is partnering up with Hewlett Packard and joining the HP PartnerOne Program. This particular program is geared toward helping service providers bring innovative hosted solutions to potential clients quicker and easier than ever before.

What are the Ramifications of Not Securing Files Held in the Cloud?
August 19, 2015 - 11:07 AM
Storing data online has become so popular, it has become the norm for many individuals and business. Online threats are always a worry, whether you're a casual user or a business that has a large cloud solution in place.

IT Security Officers Believe They are in Nation-State Cyberattack Crosshairs
August 18, 2015 - 8:41 AM
Those in the security business may be deserving of a hearty welcome back from scorching Las Vegas, which was ground zero for hackers, good and bad, for the last few weeks thanks to the Black Hat USA 2015 and Defcon5 conventions. Based on preliminary reports, nobody got hurt, but the news was certainly enough to send attendees of both scurrying to the local pharmacies for some strong antacids.

Hackers Report Easy Access to Privileged Accounts Despite Increased Security Spending
August 17, 2015 - 2:37 PM
Hackers are regarded, and not without reason, as one of the greatest dangers information technology can face. While there will be some discussion over that point-especially in terms of the distinction between hackers and "crackers," or white hat versus black hat hackers-the point remains that those who would enter systems without permission are still a major threat.

Lenovo, HTC Slash Jobs in Response to Flagging PC Sales and Crowded Smartphone Market
August 14, 2015 - 10:59 AM
In a true testament to just how disruptive the cloud and mobility have been in the traditional tech space, Lenovo has announced plans to cut 5 percent of its workforce, the equivalent of about 3,200 jobs. The company has been experiencing declining revenues and struggling with the steady decline of the PC market.

Malicious Firmware Hits Cisco Customers
August 14, 2015 - 9:46 AM
Hackers are a unique breed. Their ability to learn, adapt and continue infecting devices is truly impressive. It seems as though before security firms find a solution to the latest attacks, the hackers are already breaking the new code.

New CISOs Face Emerging Universal Challenges
August 13, 2015 - 4:03 PM
The office of chief information security officer (CISO) has two primary issues facing it before a new CISO can even set his or her briefcase down and find a chair: rapidly increasing numbers of regulations addressing the field of information security, and increasing numbers of threats coming from data breaches as hackers start to realize the value of data kept on hand.

Three Truths and a Lie About Adaptive Storage in a Software-defined Future
August 12, 2015 - 4:00 PM
As it has been for the past three decades, the storage market is going through another one of its cyclical changes, and new vendors are emerging as challengers to the big boys.

Is it Time for an Inside-Out Cleanup of Your Website?
August 12, 2015 - 1:01 PM
Building and maintaining a website is very similar to building a house: you need to keep it safe, clean and visitor-friendly. But unlike the dust that settles atop the various objects in your house, a dirty website doesn't always show symptoms of a much needed cleaning. So, how often should you clean your website? Weekly? Monthly? How about 24/7?

The First 100 Percent Cloud-based Supply Chain Execution Convergence Solution is Here
August 12, 2015 - 11:43 AM
LogFire, a cloud-based provider of supply chain fulfillment solutions, is integrating its Warehouse Management System (WMS) with Oracle Transportation Management to create the cloud solution. This will connect networks in real time so companies can lower fulfillment cost and increase the speed in which transactions are processed.

Why One National Restaurant Chain Chose a Telecom Expense Management Solution
August 11, 2015 - 3:31 PM
Telecom sourcing and procurement is especially challenging for multi-location businesses due to the wide variety of billing formats, complex market offerings and technical expertise needed to fully manage these environments.

Five Ways Managed File Transfer Improves IT Agility & Productivity
August 11, 2015 - 3:05 PM
In the past five years, the amount of data stored has grown hundreds of times over-meaning organizations of all sizes, across industries are challenged with safeguarding this quantum level of sensitive information and securely transferring it. While protecting data is the responsibility of everyone within an organization, IT professionals inevitably own this task and are held responsible when something goes wrong. Consider the added pressure of state and federal regulations and it's clear that file transfer administration can stretch IT departments thin, keeping them from being more responsive to business needs.

Data Management is the First Step to Achieving Business Agility in the Customer Age
August 11, 2015 - 2:56 PM
We have entered the age of the enlightened and empowered customer, and companies are being challenged to meet a growing number of demands. Customers are using social media, mobility and other platforms to wield their purchasing power and influence and businesses need to be able to meet them head on to get a handle on managing the customer experience.

Accenture Tops Gartner Report as IT Services Provider
August 11, 2015 - 11:56 AM
Communication service providers (CSPs) are companies that assist communications vendors with all manner of product fulfillment and customer interaction. Behind them are the IT services providers that support those goals with hardware and software for processing of digital data such as that for analytics and communications.

IT Groups Increasingly Tapped for Innovation Amid Pressure from Leaders
August 11, 2015 - 11:47 AM
Information technology (IT) groups are increasingly being viewed as the goose that lays the golden eggs in many companies. While some are content to allow those eggs of value to come naturally, others are demanding an increased egg-laying pace. A new study from the Business Performance Innovation (BPI) Network shows just what's being expected from IT these days.

3 Steps to a Better Virtual Workspace
August 11, 2015 - 7:25 AM
There are plenty of reasons why more and more companies have been implementing virtual workspace technologies. Sometimes it's an international team or a salesforce that's always on the move. Other times it's just a brutal commute that doesn't need to be done every day.

Executives See Need for IT Improvement but Lack Execution
August 10, 2015 - 4:51 PM
It is summer here in the northern hemisphere and the heat is on. In addition to the scorching temperatures, it is also report publishing season, and my summer reading has been filled with some hot insights that are worth sharing. In fact, I'd like to draw attention to the latest addition to my digital library: the new study from international executive change advocacy group, Business Performance Innovation (BPI) Network, titled, "Accelerating Business Transformation Through IT Innovation: Getting the Business Leader Take on the IT Change Mandate."

Combating New IT Security Challenges: IPv6-Based DDoS Attacks
August 10, 2015 - 10:54 AM
IPv6. We've heard it's been coming for years but no, it's not here yet. However it's "here" enough to be a security threat to every organization that has started their migration to IPv6. With IPv6 adoption comes new security challenges. Although only 25 percent of websites completely support IPv6 today, many more are supporting v6 in parts of their network, whether their operators know it or not.

Lantronix Updates SLC 8000 with FIPS Encryption
August 10, 2015 - 10:46 AM
Lantronix has long developed its SLC 8000 modular console manager to tackle in-band and out-of-band enterprise IT equipment management. The company's latest development concerns its release of of its flagship hardware.

XCEL to Leverage Canadian Web Hosting to Deliver VMware-based Cloud
August 10, 2015 - 9:15 AM
XCEL Professional Services provides IT support and consulting services to major cities in Western Canada. In order to expand its service offering, it will now partner with Canadian Web Hosting which offers enterprise-grade infrastructure-as-a-service throughout the country.

Accellion Releases kiteworks Governance Package
August 10, 2015 - 9:09 AM
Accellion develops its kiteworks for enterprises so they may securely share files and remain in compliance with legal and regulatory requirements. The company's most recent announcement regards some additions to the security and governance capabilities of that software.

How Security Companies Fuel Their Channel Partners: Part 2
August 10, 2015 - 6:23 AM
Gartner estimates the global information security market to be worth $76.9 billion today, and it is not only enormous, but it is also complex and multi-faceted. There are truly hundreds upon hundreds of cybersecurity suppliers for IT executives to sift through and analyze to stay ahead of the threats. This is why IT security consultants play such a critical role in the value chain, and enterprises rely on them to stay up on the threats and recommend the best solutions to protect their businesses.

10 Things IT Admins Should Keep in Mind for Windows 10 on Mobile
August 6, 2015 - 3:44 PM
Windows' Smartphone market share is hovering at a lowly 3 percent, but hopes for Windows 10 on mobile are high. According to CEO Satya Nadella, Microsoft's "big mistake" was to focus on the PC as the perpetual hub for everything. As result, the company was slow to recognize the importance of mobile devices, and this opened up the fast-track to obsolescence.

Netwrix Announces 80 Percent Channel Partner Network Growth over Last Quarter
August 6, 2015 - 3:30 PM
IT auditing software provider Netwrix has announced that its channel partner network grew by 80 percent quarter-over-quarter in the past year and represented 25 percent of its revenue.

The True Nature of the EMV Liability Shift
August 6, 2015 - 9:10 AM
The U.S. payments industry is bracing for the October liability shift for EMV adoption. Though the U.S. market accounts for more than half of the world's payment transactions, it is an unregulated market with an array of players: merchants, processors and payment terminal manufacturers, independent software vendors, merchant banks, credit and debit card issuers and more. The scope and uniqueness of this market makes the pending migration to EMV particularly complex.

Laying Out Benefits of SD-WAN Solutions
August 5, 2015 - 6:21 PM
Talari, a company that has been recognized as one of the global leaders when it comes to providing Software Defined WAN solutions has just gotten a rather large honor when it was named as a top provider for SD-Wan solutions by industry analyst Gartner. Talari was named in a report called "Technology Overview for SD-WAN" and it should be pointed out that the firm has to be having some rather decent success if it is going to make a mention for such a well known analyst firm.

Advance/Newhouse buys 1010data for $500Mn in Big Data Deal
August 5, 2015 - 3:43 PM
Conde Nast and Bright House Networks parent Advance/Newhouse is going for a big deal on Big Data. The media giant has agreed to acquire a big data analytics company, 1010data, in a deal worth $500 million.

Yahoo's Ad Network Attacked and Exploited by Hackers
August 5, 2015 - 2:24 PM
Why do something yourself when you can get others to do the work for you? This seems to be the thought behind hackers who attacked Yahoo's ad network. Cybercriminals, or hackers, found a way to utilize Yahoo's own ad network as a deliver system for malware to an undisclosed number of visitors.

Wheelings & Dealings: Zscaler Nets $100 Million in New Funding Round
August 5, 2015 - 9:18 AM
Already considered one of the top security firms in the world, Zscaler has just landed a brand new round of funding that totals around $100 million that was led by TPG Growth. The firm is one that has made its bones focusing on making enterprise networks safe to connect to the Internet by first scanning and then filtering traffic.

How Security Companies Fuel Their Channel Partners
August 4, 2015 - 4:02 PM
The cybersecurity market has been one of the hottest sectors in IT since the early days of the Internet, and it is now seeing renewed sense of urgency as "hackers and nation states are increasingly targeting websites in an attempt to gain illicit access to enterprise networks and highly valuable digital assets," according to Frost & Sullivan Network Security Analyst, Chris Rodriguez (Apr. 2015). Therefore, it's no wonder that IT decision makers' spending on security technologies will increase 46% in 2015.

EdgeConneX to Host MASS IX Node at Boston Edge Data Center
August 4, 2015 - 3:32 PM
EdgeConneX, a company specializing in hosting solutions at the edge of the network, has announced a partnership with the Massachusetts Internet Exchange (MASS IX). Mass IX will build a new remote node at the Boston Edge Data Center.

What Enterprise IT Needs Besides Docker
August 4, 2015 - 2:58 PM
Let me be clear: Docker is a fantastic technology that is enjoying widespread adoption by enterprises. A recent StackEngine survey found that more than 70 percent of respondents are actively evaluating or using it. However, for reasons that will be discussed below, Docker alone is not sufficient for enterprise use.

Is it Time to Let Companies Shoot Back in Cyber Warfare?
August 4, 2015 - 12:58 PM
Some of the greatest dystopian cyberpunk future tales, particularly those of William Gibson, envision a future where corporations staff militaries for use against a variety of enemies both foreign and domestic. The idea that such a future could come to pass would have seemed ludicrous until the recommendation of Juan Zarate emerged, suggesting that private companies should be "deputized" to strike back against cyberattackers.

Google Paper Highlights Experts' and Non-experts' Security Practices
August 4, 2015 - 12:19 PM
A recent Google research paper that addresses information security is making the rounds at various tech news sites. It offers a number of suggestions for what you can do to properly protect yourself and notes what you may be doing wrong in those attempts.

Declare a Permanent Truce in the IT War Room
August 3, 2015 - 9:08 AM
While the development of cloud and SaaS-based applications and services has done wonders to improve how knowledge workers collaborate and share information, it is also wreaking havoc on enterprise IT departments.

Microsoft's Support of Secure Shell: What it Means and What Lies Ahead
July 30, 2015 - 9:10 AM
With 128,000 employees and annual revenues of $86.8 billion, Microsoft is a mega-corporation. It is the third most valuable company in the world by market cap and its software powers the majority of home computers, industrial and financial systems. So, when Microsoft announces a change in direction, it's worth taking notice.

Is it Possible for High Tech to Generate More Service Revenues?
July 24, 2015 - 9:43 AM
By providing customers with subscription services, for example, high tech companies improve the buying experience of customers because they can continuously evaluate the hardware, software or service. Experiences customers have using these become paramount. High tech companies could investigate how this new model supports business strategies, increases their chances of possessing the underlying capability blueprint to support new subscription models, and affects their operations.

How Being the Department of 'Now,' Not the Department of 'No,' Improves Workplace Culture
July 24, 2015 - 8:49 AM
Combining the personal and business use of high-tech devices and applications, however, is a more recent phenomenon that's blazing an irreversible trail. While this growing movement of versatile devices in the workplace provides flexibility and offers a wide range of options to increase employee productivity, it puts the modus operandi of back-office technology in peril, leaving IT departments precariously teetering on the edge of falling from hero to zero.

The Average DDoS Attack is Big and Getting Bigger
July 23, 2015 - 11:41 AM
There are few things that Internet professionals are afraid of in normal operations. While power outages and similar disasters are certainly on the list, these are some things that can be overcome with a little judicious planning and some good old fashioned backups. One point, however, can bring the typical day to a halt regardless of what backups are in place: the distributed denial of service (DDoS) attack. These attacks can shut down websites for any length of time, and according to Arbor Networks Inc., such attacks are hitting harder than ever.

Wheelings & Dealings: Apprenda Nabs $24 Million for PaaS Investment
July 22, 2015 - 4:29 PM
Platform-as-a-service (PaaS) provider Apprenda has clenched a $24 million funding round.

IBM Expands Open Source Initiatives
July 22, 2015 - 3:25 PM
Fresh off the heels of its earnings announcement yesterday, IBM today announced the next step in its long-standing commitment to the open source community.

Another Threat from Anonymizers: Shotgun DDoS Attacks and How to Protect Your Site
July 22, 2015 - 8:40 AM
An anonymizer is what it sounds like: a program or service that protects your online identity by allowing you to conduct your internet activities through what's called a proxy server. So instead of your activities and online movements being attributed to you, they're attributed to the proxy server. If you're thinking anonymizers aren't always used for good reasons, like protecting the communications of people in countries that face extreme censorship, or helping online stalking victims, then congratulations, you understand human nature.

5 Simple Steps to a Centralized ERP Solution
July 21, 2015 - 9:24 AM
Big IT programs can be hugely complex to implement and need the buy-in of numerous employees within an organization - and none more so than where you have multiple sites within one organization performing different functions, all operating disparate IT systems. Your design department may be based in Chicago, your manufacturing arm in London, with HR and Finance based in Paris. All of these divisions need a comprehensive IT system, but how can the enterprise effectively manage and report on operations across the organization? Kevin Deal, Vice President for Aerospace and Defense for IFS North America, explains how a centralized ERP system can significantly improve operations and reporting.

ADQ Enlists Netsurion to Beef Up Security
July 17, 2015 - 5:33 PM
Fast food chain American Dairy Queen Corporation (ADQ) is strengthening its internal security and working hard to ensure customer data stays protected, an important move as cybercrime continues to grow into a pressing issue for businesses and organizations across all industries. The company has selected Netsurion, a provider of cloud-managed IT security services and solutions, to deploy its managed network security solution in order to benefit from enterprise-class security at a fraction of the cost of a comparable self-managed solution.

End Users Have More Access to Unstructured Company Data Than Necessary
July 17, 2015 - 4:16 PM
In the latest in somewhat alarming statistics concerning device and data security, Varonis Systems found that more than 50 percent of IT security professionals are not surprised that end users are accessing more company data than they should be. The company researched attendees at security conferences in the U.S. and Europe and found that more than three-quarters of employees work for organizations that simply can't tell them what happened to their lost data, files or emails.

Seagate Announces Cloud Storage Updates
July 17, 2015 - 4:00 PM
Storage hardware and software maker Seagate has announced updates to its hybrid cloud storage management solutions.

Report: Businesses Probably Not Ready for the 'As-a-Service Economy'
July 16, 2015 - 6:00 AM
Two out of three enterprises, according to the results of a new study from Accenture and HfS Research, aren't ready for one of the biggest changes to hit the global economy. It's a move known as the "As-a-Service Economy," and while more than half of senior operations leaders who responded to the study note that As-a-Service is "critical" to the business bottom line, the lion's share of enterprises just aren't ready to take the fullest advantage of it yet.

Will Robots Steal My Job?
July 15, 2015 - 5:11 PM
It's a favorite topic among tech enthusiasts and cost-conscious business owners: Will robots ever totally replace human labor? Some seem to think it's possible in certain industries, but others believe there's no possible way.

TriCore & Tableau Get Together on Simplifying Data Analysis
July 15, 2015 - 4:46 PM
Sometimes developments in business operations come along that have a lot of power, but are almost too much power for some businesses to effectively put to use. Some businesses might regard tools like big data analytics as like trying to weed a garden with a backhoe; too much power for the job at hand. TriCore Solutions and Tableau Software, meanwhile, are getting together to help make analytics tools more accessible to the enterprise user and, thus, more likely to be put to work.

Demystifying Data: How Small Businesses Can Leverage Big Data for Business Growth
July 15, 2015 - 9:42 AM
Big Data is a nebulous concept, but nonetheless, the buzzword is here to stay. We're only at the beginning of the big data and intelligence era, as technology companies continue to build smart tools to help make sense of all the data that's being generated, but big data and intelligence will continue to permeate throughout all industries and at every level of business.

Varonis Systems Updates Security Capabilities of DatAnywhere with Version 2.5
July 13, 2015 - 10:21 AM
Varonis Systems, a provider of software solutions that help enterprises map, analyze, manage and migrate unstructured data, has announced the release of version 2.5 of DatAnywhere, a cloud enterprise file-sync and -sharing solution.

Telco Systems Gets $20 Million Government Contract to Build Secure Network
July 13, 2015 - 8:55 AM
Telco Systems has announced that a government agency has awarded the company a contract worth over $20 million over the next five years.

Cisco Announces Investment in UK Tech Growth
July 10, 2015 - 10:32 AM
Cisco is quite savvy to the old phrase "you have to spend money, to make money." In a recent announcement, the firm has committed to investing another $1 billion into the UK in order to foster the country's digital economic growth.

Cyber Security Risks and Planning Generally Not Part of Broader Corporate Strategy Yet
July 10, 2015 - 9:25 AM
CFOs seem to be in agreement when it comes to prioritizing cyber security risks, with most executives able to pinpoint the most critical assets and systems in need of protection. A new survey from technology consulting firm Tatum shows that confusion sets in at the executive level when it comes to understanding the inherent responsibilities associated with cyber security across the board.

How DevOps is Changing the Game for Enterprise IT
July 9, 2015 - 10:00 AM
Slowly, but surely, the landscape is changing and developers are growing in terms of reach and responsibility. We have arrived at a point in history that brings a new department to the table: DevOps.

Seven Cloud Security Mistakes Bound to Bite You
July 8, 2015 - 3:43 PM
Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise's data apply.

Tomorrow's Connectivity Today
July 8, 2015 - 11:32 AM
Connectivity is driving a revolution in the way that companies address their IT needs. Gone are the days when businesses could operate from 8:00a.m. to 5:00p.m. and still be successful. In today's hyper competitive environment, the biggest challenge for businesses in the Middle East lies in becoming an Always-On Business, one that must operate 24 hours a day, seven days a week, 52 weeks a year.

SharePoint Latency Issues are Criminal- Real Time Information Access is Vital
July 8, 2015 - 11:00 AM
Microsoft SharePoint is close to industry standard for all kinds of business- and enterprise-level interactions. File management, business intelligence, collaborative activities, and search are all part of the SharePoint package-so when the web application is running slowly, it is felt at every level of the company. Latency issues affect customers, as well, so it's vital to be proactive in the search for latency problems. Ideally, customers and most employees would never even sense the issues by the time they were solved, but that isn't always the case.

New Partnership Between SAP and CFG Takes Soccer/Football to the Cloud
July 8, 2015 - 10:23 AM
Even though FIFA (Federation Internationale de Football Association) is battling deep rooted corruption at the moment, the game is still loved by billions of people around the world. The women's World Cup in Canada had a record number of attendance and viewers as the US took the cup for a record third time; which goes to prove the game is much bigger than any corrupt officials. With more fans than ever accessing the game online, football organizations are partnering with tech companies that will give them a platform to better address front office operations and fan engagement. The partnership between SAP and City Football Group (CFG) looks to do that by improving overall operations from the boardroom all the way to the fans.

Cisco Buys Cloud Software Management Company for $139 Million Following OpenDNS Acquisition
July 7, 2015 - 5:51 PM
Cisco is scooping up California cloud-based software management provider MaintenanceNet for $139 million, the company announced today. The company, which specializes in helping manufacturers easily track their warranties and service agreements with customers, has counted Cisco as a customer since 2009.

Red Ocean/Blue Ocean: How to Exploit the Hottest Data Center Trends
July 7, 2015 - 2:43 PM
There are a slew of trends shaping the data center market today for integrators, vendors and channel partners, including software-defined everything, automation, containers and more. But the key to making the most of the opportunity is the ability to answer this: Are you swimming in a red ocean, or a blue ocean?

Veracode Report: Business Applications Often Lack Solid Encryption
July 2, 2015 - 3:17 PM
Many business applications contain security vulnerabilities due to a lack of adequate encryption. So says a report recently issued by Veracode. Application developers typically lack expertise in cryptography and often do not follow best practices for encrypting data properly.

Kordia Joins Asigra Partner Ecosystem to Deliver Backup and Recovery Services
July 1, 2015 - 5:29 PM
Before digital technology became widely available, if there was ever a disaster at a particular location, the recovery process was slow and very expensive. Even though there were mechanisms in place to store sensitive documents off-site, the possibility these facilities could suffer the same fate was very real. But digital technology now makes it possible to implement backup and recovery solutions in place at multiple locations to ensure availability at all times. One of the companies that makes this possible is Asigra Inc., a cloud backup, recovery and restore software provider since 1986.

Wheelings & Dealings: Cloud Technology Partners Scores $3.5 Million Funding Round to Scale Out Operations
July 1, 2015 - 3:36 PM
Cloud services provider Cloud Technology Partners has received a $3.5 million top-up round of funding, the company announced. The firm specializes in cloud projects for enterprise clients, largely in the Fortune 500 segment. It also works closely with infrastructure providers AWS, Google Cloud Platform and others to promote adoption of both public and hybrid cloud services.

Three Steps to Prepare an Enterprise for Digital Revolution
July 1, 2015 - 3:32 PM
Business innovation through digitization and the reimagining of business processes driven by data has become a necessity for every organization across a variety of industries. Consumers have led the business in this charge, leaving businesses with no choice but to respond or perish.

Wheelings & Dealings: Cisco Targets OpenDNS in Nine-Figure Acquisition
July 1, 2015 - 9:17 AM
Network security is front-of-mind for a lot of companies and individuals alike these days, and Cisco is no different. A new report direct from Cisco says the company is looking to pick up network security firm OpenDNS in a deal valued at $635 million in cash, which is expected to conclude in the opening days of 2016.

Evolve IP Launches IT-as-a-Service
June 29, 2015 - 6:06 PM
Evolve IP, a service provider of cloud-based resources for IT departments, recently announced the launch of its IT-as-a-service (ITaaS) program which will give those same departments access to outsourced management services and self-administration tools.

Report: Facial Recognition Market About to See Huge Jump
June 29, 2015 - 10:46 AM
While facial recognition software is not actually that new, it is apparently going to be seeing a resurgence in popularity over the next few years according to a new report. The technological breakthroughs that led to facial recognition back in the 1980's and 1990's has seem some serious advances in the 2000's while the tech has also become less expensive to integrate. This is why industry analyst Tractica says that adoption of facial recognition is going to be particularly strong when it comes to mobile device authentication.

Five New Stats on Project Portfolio Management in 2015: Lack of Resources and Alignment Challenges
June 29, 2015 - 10:10 AM
There continues to be a high rate of failure for IT projects and lack of resources for project management, according to a new survey by Innotas. The survey also revealed the lack of a methodology to score and prioritize projects, showing that many organizations still do not have an approach that enables project success. These five key findings from the survey illustrate the trends-and the challenges-facing organizations' project portfolios and project management strategies:

People, Process and Technology: A Recipe for Security
June 29, 2015 - 6:00 AM
Data security is a hot topic, as seemingly every week a report announces yet another hack of sensitive information. Whether it's the enterprise, government or Joe Plumber, security must be front of mind. One company, providing protection to firms of all sizes is managed service security provider, Alert Logic.

IBM Announces Its Version of Container Technology
June 29, 2015 - 6:00 AM
IBM announced recently that it had created enterprise class containers to facilitate application development in hybrid environments. The company's efforts to push container technology are part of a larger movement that seems to be gaining popularity with many businesses.

Amdocs Helps CSPs Migrate to New Data Warehouses, Leverage Big Data for Marketing, Sales & Network Planning
June 25, 2015 - 9:11 AM
Communications service providers' existing data warehouses are hitting the wall as the amount of data they need to house and share multiplies. Amdocs is helping these companies upgrade to newer systems that are up to the task, assisting these businesses in transitioning their data from legacy to next-generation data stores, and providing a wide array of platforms and applications to help businesses use big data to their advantage.

Free Your Data
June 23, 2015 - 11:46 AM
AgilData CEO Dan Lynn's presentation on the main stage of Cloud Expo NYC starts off with a black and white video clip of Bruce Lee explaining the agility of water. He says with his indelible charm, "Water can flow or it can crash. Be water my friend."

LogMeIn Named One of 'Best Places to Work' for Eighth Straight Year
June 22, 2015 - 2:34 PM
The Boston Business Journal released its annual list of "Best Places to Work" earlier this week, and, for the eighth consecutive year, LogMeIn, Inc. found itself among the top 3 amongst all large companies. LogMeIn's CMO, W. Sean Ford, was elated at the news, saying "It is an honor to be recognized among Boston's elite businesses as a top place to work." The company is one of the largest cloud software companies in Boston and the largest in the Fort Point district, employing nearly 600 people.

Parkour for Enterprise Networks
June 22, 2015 - 1:54 PM
Just as the French discipline of parkour identifies the most efficient route from point A to point B, Tel Aviv based network security company Tufin automates secure application connectivity over an enterprise network. And like parkour-the subject of viral Internet videos of athletes scaling skyscraper facades and hopping between rooftops-the idea, in theory at least, is to do this as safely as possible.

The Inside Job: The Biggest Threat to Cybersecurity?
June 22, 2015 - 12:49 PM
For most of us, threats to our computer systems come from the outside in. We're concerned about viruses, about malware, about distributed denial of service (DDoS) attacks that can cripple our systems without proper vigilance. But what we don't commonly consider is the attack that comes from the inside, and a new report from Crowd Research Partners suggests that this may actually be an even bigger threat to our systems' way of life.

Biometric Security Getting Bigger, Faster
June 22, 2015 - 10:39 AM
When it comes to lock-down security in mobile devices, both people and companies are looking towards biometric security more and more every day. A new report by industry analyst Tractica underlines this trend, estimating that fingerprint readers in mobile devices will surpass the 1 billion units shipped per year mark by the end of 2021. This report also claims that this growth will mean that more than one-third of all mobile devices sold around the world will include fingerprint scanners.

Survey Shows Workers Happier With In-House IT Departments
June 22, 2015 - 10:28 AM
Despite the perception that company employees are growing ever more annoyed with company IT departments, a new survey run by LANDESK shows that employees are actually quite happy with their in-house IT departments. In fact, the report shows that more than 80 percent of employees gave their IT departments an "A" or a "B" when asked to assign their IT departments a letter grade.

A Security Manifesto: Why Are Breaches Inevitable?
June 19, 2015 - 5:30 PM
Face the facts: at some point, sooner or later, your system will be breached. It's no longer a question of "if", but rather "when". Why? It has to do with the very nature of the Internet itself, the increasing complexity of our connections, and a growing web of software and hardware that daily adds openings into the silos we expect to be interconnected and secured all at once.

Attempting to Accelerate API Development?
June 18, 2015 - 4:22 PM
An application programming interface (API) is the mechanism through which applications or programs communicate and exchange information. In today's digital economy which is powered by mobile and cloud applications, APIs have become the fabric that brings and connects the disparate digital pieces together. While facilitating this data interchange is essential, it is critical that it is done in a secure fashion, allowing only access to data that is authorized and appropriate based on the context of operation.

Decision Engineering Can Help Organizations Make Better Choices
June 18, 2015 - 10:07 AM
It's time for companies to stop relying solely on spreadsheets to make decisions and start using new methods, according to several management experts.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter