New Business Models Address Printer Security Concerns September 20, 2016 - 2:53 PM It's startling to think that the printer, the every-day office appliance we rely on so heavily, could be the gateway for a security breach that could bring an institution to its knees, but that's precisely what's been happening. The integration of printers into increasingly sophisticated document management workflows makes them a critically important, yet often-overlooked link in a corporation's global security chain, if the right measures are not taken.
ServiceNow Certifies Xangati ESP App September 20, 2016 - 2:01 PM Xangati helps businesses take control of their virtual data centers. Its Xangati ESP software scans virtualized data centers and hybrid clouds to identify performance issues and automatically take action to resolve such issues.
Don't Let Your Legacy ITSM System Stymie Your Digitalization Push September 20, 2016 - 10:19 AM Today, companies are embarking on broad-reaching digital transformation strategies, using technology to change the way people work, communicate and interact with customers. We call this approach digitilzation. Digitilization is helping organizations make more informed decisions, accelerate the development of new products and services, transform their supply chains and gain deep insights into their customer's needs. As enterprises continue to execute on their digital strategy, they are asking IT to provide more services. All these services need to be delivered and managed effectively.
How to Make Digital Transformation Grow Your Business September 20, 2016 - 9:05 AM What is it like to trim the sails to the winds of digital transformation today? Well, it is more than building a solid strategy with a carefully elaborated plan to go digital. On the contrary, a winning digital transformation strategy today is more liquid than ever.
Hidden Lessons of Incident Management September 15, 2016 - 1:05 PM One of the most common early goals of implementing DevOps best practices is a deep understanding of your systems in a stable state. However, this objective is not a "one and done" effort. It is important to continuously circle back in some form as changes are introduced. It's an ongoing exercise for an entire organization as processes, tools and teams improve continuously over time.
Companies Have a False Sense of Cyber Security September 13, 2016 - 1:31 PM It's one of the great classic films of our time, "Monty Python and the Holy Grail." In it, a character known as the Black Knight takes repeated blows from King Arthur's sword, only to protest that the dismembering blows taken are merely "flesh wounds," even to the point where the Black Knight is a torso on the ground. Companies in a recent Juniper Research report are behaving similarly to that oblivious knight, as defined by recent numbers about the state of their cyber security.
Why Three Sandboxes Are Better than One September 12, 2016 - 8:31 AM Today's companies are hyper-aware of the importance of security, conditioned by years of disastrous, high-profile data breaches in the news. Still, because of the heightened awareness among corporate IT departments, it's rare that a business gets breached due to a total absence of security systems. More often, it's small holes in their security programs that lead to data compromise.
Intel to Spin off McAffee in $4.2B Deal with TPG September 9, 2016 - 2:43 PM While revenue for Intel Security was up 11 percent year over year for the first half of 2016, according to Business Insider, combining McAffee and Intel was probably not a great idea in the first place given the two companies have very different models and processes, and in light of the fact that Intel effectively halved the value of the company since it bought it.
Ways Startups Can Leverage Big Data for a Competitive Advantage September 9, 2016 - 12:02 PM People who are new to the world of big data tend to think that it can only be leveraged by Big Business and for the benefit of Big Brother. While it may be that big data is often used by major corporations as well as by surveillance organizations, the truth is that even small tech startups can benefit from data-driven practices.
Five Communication Tips to Help Engineers Advance Their Careers September 8, 2016 - 4:04 PM In the past, engineers were tasked with building and inventing - and if they weren't that adept at getting their vision across with words, someone would translate for them. In today's socially networked world, engineers need to be able to effectively convey their ideas. They need clear communication skills to further their careers.
How the San Diego Padres Scored Big with Cloud Communications September 8, 2016 - 1:29 PM When you're running a major enterprise business, the last thing you want to have to worry about is managing your communications system. You just expect it to work, and work well. It's fair to say that, when you are running a Major League Baseball franchise, that sentiment increases exponentially. Not only do you have to ensure staff and personnel have a reliable communications infrastructure in place, but you are also potentially dealing with 40,000 or more customers on a daily basis who require a consistent service experience.
Bimodal IT: A Step in the Right Direction August 31, 2016 - 2:43 PM The concept of bimodal IT, like the game of "Telephone," has been obscured as people have put their own spin on it, leading to backlash and confusion. Some organizations have moved ahead and implemented continuous delivery models, while others are still transitioning and experiencing growing pains.
Ransomware Attacks Climb as Employee Security Slips August 31, 2016 - 2:23 PM It doesn't take a lot of study in the cyber security field to know that there's been a lot more in the way of ransomware attacks lately, and that puts every company out there-not to mention individuals-that much more at risk. While it would be easy in turn to think that heightened vigilance is the response to such circumstances, a new report from the Ponemon Institute sponsored by Varonis is revealing the exact opposite, making for a perfect storm in progress.
New Study Credits Large Portion of Cyberattacks to Hidden Malware August 31, 2016 - 11:41 AM With data breaches becoming a sickeningly familiar fact of life these days, it's worth a closer look at the causes and maybe even potential solutions to such matters. A new study from the Ponemon Institute and A10 Networks shows that large numbers of organizations actually fell victim to cyberattacks, and that one common cause was part of everyday operations: encrypted traffic.
AI May Soon Be a Major Player in Your Industry August 29, 2016 - 4:56 PM Depending on your perspective, artificial intelligence (AI) is either incredibly cool or terrifying. AI is a term referring to information systems that are inspired by biological systems. They cover multiple technologies including machine learning, deep learning, computer vision, natural language processing (NLP), machine reasoning and strong AI. AI is often used to make human lives easier by having a transformative effect on consumer, enterprise and government markets around the world.
Modern Choices for Overcoming DNS Challenges August 29, 2016 - 3:52 PM Back in the day, families had one TV in their homes. There were only a handful of channels to choose from. Entertainment was simple and easy, and that one set was the hub for the whole family. Today, the average U.S. household has 2.8 TVs, with potentially hundreds of channels via satellite, cable and online sources.
San Diego Padres Talk Recent Technology Overhaul August 29, 2016 - 9:46 AM The San Diego Padres are a major organization and they have successfully made the necessary changes to ensure customer satisfaction. While baseball may not be your business, there are still plenty of lessons to be learned from the team's changes. You can learn more on this topic by tuning into the Mitel-sponsored webinar, titled "Exclusive IT insights from the San Diego Padres: mobility, contact center and cloud," on September 13.
Creating the Future of Storage Today with Scale-Out NAS for Hybrid Cloud August 23, 2016 - 11:24 AM Traditional approaches to storage offer vertical scaling, which clearly falls short of being able to accommodate today's exponential data growth. Vertical scaling solutions are proving cost-prohibitive and cannot meet performance demands. Hybrid cloud presents a way for organizations to gain the maximum amount of business flexibility from cloud architectures, which helps maximize budget efficiency and performance goals at the same time. In a nutshell, hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and public cloud services, with orchestration between the two platforms.
Administrators Can Use DNS RPZ for Malicious Site Queries August 23, 2016 - 7:44 AM The Domain Name Server (DNS) Response Policy Zone (RPZ) is an open, vendor-neutral standard for the interchange of DNS firewall configuration information. RPZ was developed by the Internet Systems Consortium (ISC) to fight the abuse of the DNS by groups or individuals with malicious or harmful intent. RPZ is a standard feature of BIND 9 (Berkeley Internet Name Domain) as of version 9.8.1 and was built upon the Mail Abuse Spam Project, which introduced reputation data as a means of protecting against email spam. Due to the proliferation of criminal activity on the Internet, it is difficult for the Internet security industry to remove criminal infrastructure at domain registries, hosting providers or ISPs on a timely basis.
Intel Cuts a Deal with ARM August 18, 2016 - 4:05 PM ARM technology has cemented its position in the smartphone market. It's become so popular, in fact, that none other than Intel Corp. is licensing technology from ARM Holdings Plc.
Getting Digital Supply Chain Management Right August 18, 2016 - 8:38 AM Manufacturers and distribution companies focus a lot of time and money on their supply chains, and rightfully so. Supply chains provide the staging grounds and storage areas for all the raw materials, in-progress inventory and finished goods that must move from the point of origin to point of consumption.
IT Departments and the Future of Employee Screening August 15, 2016 - 8:25 AM Information technology teams can hold a wide variety of roles within an organization, from troubleshooting PCs to software training to maintaining network security. However, as tech has become more integral to the way employees work each day, IT roles have expanded. In some cases, businesses bring their IT workers in on business decisions in an analyst role. They also ask them to help with technology-related purchasing decisions.
Accelerate Digital Transformation by Creating a High-Velocity Culture August 4, 2016 - 9:12 AM MIT Professor Steven Spear introduced this concept in his 2010 book "The High-Velocity Edge: How Market Leaders Leverage Operational Experience to Beat the Competition." Professor Spear states that any organization can create a high-velocity culture. It's not a matter of having more people, more tools or newer technologies. Rather, the high-velocity organization works constantly to figure out how to do something faster, smarter and less costly. And that provides the IT department with the opportunity to lead the transformation of the entire organization.
Datalink Shows Off New Cloud Complete Hybrid Cloud System July 29, 2016 - 10:42 AM An ever-growing array of options in the cloud field can make it difficult to choose just what exactly to go with in terms of setting up or expanding current operations. Datalink recently made that process just a little harder-or a little easier, depending on perspective-with the new release of its Cloud Complete package of services.
Work Hacker: Cars.com July 25, 2016 - 2:27 PM We humans have become quite adept at modifying and upgrading tools and machines to make our lives easier. Consider the car enthusiast who goes under the hood to add more horsepower. Or the video gamer who opens the PC to install more memory and a new graphics card. And now we're starting to move beyond just tinkering with individual systems to overhauling entire business processes.
Survey Reveals Common IT Challenges to Supporting Remote Locations July 25, 2016 - 9:33 AM The central office has long been the center of gravity for most business IT organizations. That's where the data center is, and where most of IT's staff works. But those personnel and systems are increasingly asked to support users at remote and branch offices (ROBOs). These locations are crucial because that's often where business happens. That's creating difficulties for IT professionals who are discovering that supporting ROBOs is expensive, resource-intensive and increases risk of data theft or loss.
Docker Cloud Back Up After Outage July 21, 2016 - 3:10 PM Earlier this summer, Docker held the DockerCon event at which it talked about enhancements to its solutions intended to make them better suited for production environments. Some of these enhancements were in the security realm. This week, however, Docker Cloud experienced a 12-hour outage. Here's what Docker and a few other sources had to say about it.
Harnessing Social Media for Your Business Growth July 21, 2016 - 3:01 PM In the modern world of technology, businesses, either big or small, are well aware of the importance and benefits of social media marketing. The competition is getting tough and, to attract new customers, one must stay relevant.
Keep Score to Boost Workplace Productivity Levels July 21, 2016 - 8:17 AM We have at our disposal an ever-growing array of devices, applications and collaboration platforms to make our lives easier and more productive. On our personal time as consumers, we use these technologies to shop for clothes, order a car service, manage our finances and perform just about any other task in just minutes. No phone calls, no paper forms to fill out, no emails. And we can do everything in real-time. So why does today's workplace lack many of these advances? Why is our work life unable to keep up our personal lives? Are we actually becoming less productive?
It's Time to Stop Doing Your Data a Disservice July 20, 2016 - 11:37 AM Analytics and data - on their own - are relatively useless. The only way to unlock the full potential of these important assets is by using strong visualizations that connect your audience to the meaning inside. It's time to stop doing your data a disservice and start investing in powerful visuals that do your hard work justice.
No School Left Behind: How Technology is Helping American Schools Go Green July 20, 2016 - 8:13 AM In 2011, the United States initiated the U.S. Department of Education Green Ribbon Schools (ED-GRS) program. The goal was inspiring schools, districts and Institutions of Higher Education (IHEs) "to strive for 21st century excellence, by highlighting promising practices and resources that all can employ." Those selected each year demonstrate outstanding progress in three areas, referred to as the Three Pillars:
1) Promoting better health for students and staff
2) Providing effective environmental education-incorporating STEM (science, technology, engineering and math), civic skills and green career pathways
3) Taking action to reduce environmental impact and utility costs.
Samsung and SAP to Deliver Enterprise Cloud Systems to Asia-Pacific Customers July 13, 2016 - 1:22 PM Samsung SDS and SAP have teamed up to provide enterprise cloud systems to customers in the Asia-Pacific region. Samsung SDS, the IT service wing of Samsung Electronics, will offer cloud systems tailored for SAP solutions and applicable in the finance, sales and purchase areas of business.
Robust Security Platform = Policy Management + Authentication + Authorization + Accounting July 11, 2016 - 11:17 AM Navigating the landscape of enterprise security can be daunting - the threats typically fly under the radar, and the broad array of malware, hacks and data theft shows real innovation. Worse, the level of malicious sophistication is also on the upswing. In tandem, corporate users enjoy communicating, computing and transacting business on a variety of wired and wireless networks - using multiple devices. And the threat vectors continue to grow exponentially.
The Big One: Protecting Good Users in a Hackable World July 5, 2016 - 9:38 AM A recent article in New York magazine about a hypothetical "Big Hack" in NYC in the near possible future transports the reader into what is an entirely plausible and nightmare scenario reflecting our current state of near nudity when it comes to our digital security. In a description that evokes scenes from Stephen King's 1980s cult classic, "Maximum Overdrive," writer Reeves Wiedeman weaves a terrifying narrative. Vehicles are hacked into, causing seemingly random crashes, municipal utilities go down, and hospitals find their medical records inaccessible.
5 Things You Didn't Know You Could Do with a PDF July 1, 2016 - 11:59 AM Technology has become part and parcel of one's life, and PDF documents have been around for a long period of time.PDF has proved to be a boon to n numbers of institutions, school going children, professionals and business organizations. PDF hosts various features that are meant to make your work easier.
8 Questions To Ask Before Hiring Web Hosting Company July 1, 2016 - 8:49 AM Amid plethora of database management systems, you need to make sure that there is alignment and integration with your site and hosting company's system. Furthermore, since sites need to have a backend database, you need to ensure that your hosting service provider offers you the type of database system you are used to it.
The Cloud as Prime Path to SaaS Monetization Optimization June 28, 2016 - 7:36 AM In the previous posting on this insightful event, an illustration of Oracle's Billing and Management Cloud Service, which is a comprehensive solution to the challenges above was included. As further inducement to download the webinar, the below is amplification as to what is driving the NOW economy and why you need to be ready for what is coming.
Big Data at Your Doorstep June 23, 2016 - 8:36 AM You might think that the cloud is the best place to work through large data sets, but you may want to run the numbers first. Computation on the big data scale, that of terabytes and petabytes, requires a huge number of processor cores to work efficiently. Since cloud costs are computed based on the number of clock cycles it becomes incredibly cost prohibitive to run big data calculations on the cloud. Sure, if you are planning to run a one-off data set maybe it's cheaper to go with the cloud rather than purchase hardware, but in most other situations it just doesn't make economic sense.
NetApp SolidFire Officially Announces Docker Volume Plug-In June 21, 2016 - 12:02 PM Val Bercovici, NetApp SolidFire's CTO, says the company's technology makes it easier for cloud providers and enterprises to do cloud-like elastic storage solution without the complexity, overhead, and staff that typically requires. The target buyer of NetApp SolidFire solutions, he adds, tends not to be the storage admin, but rather is more likely to be VMware teams; Open Stack teams; and, increasingly, developers working with containers at scale.
Docker Opens Beta, Intros AWS, Azure Solutions June 21, 2016 - 11:46 AM The nicest way for an ops team to use Docker would be if Docker did the hard work of integrating Docker with AWS and Azure, he said, so that's what Docker has done. As a result, if someone wants to deploy a new Swarm on AWS, for instance, there's a cloud template, and the ops team member simple selects the desired number of nodes, clicks, and they are done.
NetApp SolidFire Officially Announces Docker Volume Plug-In June 20, 2016 - 2:36 PM NetApp SolidFire today at DockerCon unveiled the NetApp Docker Volume Plug-In, a universal driver for Docker that allows customers to save data across containers so that data continues to be available (even if the container with which it was associated isn't) for other services that might need it, and for compliance purposes. The plug-in is now available on GitHub.
Manageability Overtakes Performance as Top Storage Concern in Annual State of Storage Survey June 15, 2016 - 11:21 AM What a difference a year makes! According to Tintri's annual State of Storage Survey, a study involving hundreds of data center professionals from around the world, manageability was named as the biggest storage pain point-jumping up by ten percent compared to last year's study and overtaking performance as the top storage concern. To be exact, 49 percent of this year's respondents stated that manageability is a major challenge. How did this happen? Why such a shift?
Why Knowing How Your Apps are Performing is 'Mission Critical' June 7, 2016 - 12:46 PM There is an old saying that "you can't tell the players without a scorecard." Put another way, you can't measure, respond to and control what you cannot see. And, in what is increasingly a real-time economy, where both our personal and business lives rely more and more on the applications we use, how those applications are performing in a business context has become truly "mission critical."
Managing Availability and Ensuring Always-on Business During Summer Vacations & Holiday Season June 7, 2016 - 8:33 AM To ensure that services, applications and data are available at all times, it is not only IT solutions that must be put in place, but also routine. Planning for restoring data in the fastest and easiest way when a problem has arisen is essential if we are to avoid unnecessary downtime and loss of corporate revenue. When processes for recovery are in place and well known by corporate employees, it should not be necessary to take more than 15 minutes to get systems up and running again.
Big Data at Your Doorstep June 1, 2016 - 10:26 AM CERN has just released 300 terabytes of particle collision data to the public. This is the same data which eventually led to the confirmation of the existence of the Higgs boson, the missing particle in the standard model of physics. With this data, you could conceivably derive the signals from as yet undiscovered particles.
Monetization Optimization Paramount in NOW Economy May 31, 2016 - 5:03 PM A few weeks ago I posted an item that described the NOW Economy and why if your organization is not literally and figuratively not in the moment creating and sustaining competitive advantage and ultimately revenue growth and profitability could, to say it kindly, be problematic. As I noted then, we already live in a world where real-time (aka NOW) is the only time. It is what I have characterized as, "The Age of Acceleration," where the only constants are change and the increased speed it is coming at us.
Datameer 6: Dealing with Big Data the Easy Way May 25, 2016 - 6:42 AM The solutions puts smart data discovery to work, allowing users the ease of point and click functionality, and providing a more streamlined process. The next generation solution reworks the archaic linear steps of integration, preparation, analytics and visualization one simplified action. The need for specialized tools and skill sets is alleviated.
End of Life for Internet Explorer May 20, 2016 - 8:28 AM While it shouldn't impact the average home user with the default Windows Update settings, businesses are a different subject. Many businesses are not always updated to the latest patch level for a number of reasons.
U.S. Veteran Affairs Department Puts Out RFI for Help with Dark Web May 18, 2016 - 9:00 AM The best analogy that comes to mind is the invention and development of what we in the tech industry would call "use cases" for atomic energy. Fission and fusion are capable of both powering the world as well as destroying it. The famous phrase, of questionable origin, "With great power comes great responsibility," comes to mind. Like it or not, the Dark Web is here and here to stay, and everyone needs to be mindful of its capabilities for good and evil.
How to Tame Your Big Data So it Works for You May 17, 2016 - 8:16 AM Raw data is like a natural resource that is easy to find nowadays, but it's not quite so easy to collect or work with. Refining it into the useful ore that is organized data, from which valuable business intelligence (BI) can be derived and used to grow business success, is the central challenge of making big data work for your business.
How to Make Agile IT Portfolio Management a Success May 16, 2016 - 5:44 PM As many project management offices have experienced, shaving even small amounts of time off valuable IT projects can deliver big returns. So how do you compound that and make it work throughout your organization? Some ideas and principles from "agile" help to make IT Portfolio Management more efficient.
Building the Right Software Team May 16, 2016 - 1:21 PM Building the right Software team is hard but the payoffs are huge. Having the right team that can work, grow, and have fun together will ensure that as the technology and demand for software grows, your team is ready to provide the highest quality solutions.
How Long Should Companies Support Old Tech Before Pushing Updates? May 11, 2016 - 8:01 AM One of the most concerning things about buying into new technology - at least when it's first introduced - is the question of how long it will be supported. Time and time again we have seen situations where a company folded, was acquired by another company, or just plain stopped providing support for a particular product.
Inside Dark Web Incites Interest and Welcomes Industry Leaders May 9, 2016 - 3:56 PM The Dark Web was created to provide secure communications for whistle blowers, government agencies and the like, but today it is a tool for nefarious acts. Whether it's ordering illicit drugs or selling credit card and social security numbers, this underground network offers anonymity to evil-doers but this powerful weapon can be wielded by the "good guys" as well.
6 Tips to Becoming Better at Ruby On Rails May 6, 2016 - 12:08 PM Ruby on Rails is certainly a very useful language to learn these days, but its many applications and wide functionality mean that there's a long road between beginning to learn and mastering the language. With that in mind, here are six tips to becoming better at Ruby on Rails:
It's A Trap! Preparing For Smokescreen DDoS Attacks May 6, 2016 - 10:21 AM The threat landscape is more complex than ever, and establishing a cybersecurity strategy in 2016 entails accounting for a number of different factors. Hackers will employ a variety of techniques to achieve their goals. In order to establish a viable defense, enterprises and VARs must select the necessary technology for countering different forms of attacks.
5 Online Technologies That Seem Secure - But Aren't April 25, 2016 - 3:38 PM More often than not, the convenience offered by the Internet often outweighs the concerns we should have. Hackers find their success through persistence so you need to do the same. While users need to be able to trust the security measures put in place, those security measures are only as good as the diligence put into their configuration and implementation. When all else fails - verify before you trust.
Ericsson Reorganizes in Effort to Build Growth, Profitability April 22, 2016 - 7:23 AM Radio and transport will fall under the auspices of Business Unit Network Products. Customer support, managed services, and network rollouts will be handled by Business Unit Networks Services. Together these core business groups will focus on incremental improvements in networks business performance, and capturing 4G and 5G opportunities.
Intel Launches Restructuring Initiative, Decimates Global Workforce April 21, 2016 - 1:59 PM The world no longer largely runs on the desktop PC. While there are still plenty of use cases that call for such a device-PC gaming, heavy-scale word processing and so on-more and more people are turning to tablets and smartphones to both work and play. That means firms like Intel-who once built great empires on the strength of PC sales-must change as well. Intel recently launched a major "restructuring initiative" to accommodate this market change, and in the process, left a lot of people looking for work.
About Windows 10 Branch Updates April 13, 2016 - 8:03 AM The LTSB works in much the same way as Windows has always done with regular updates every month and product updates every few months. Alternatively, customers can choose to use the CB method which provides security updates, bug fixes and new features every few months in what is commonly known as Servicing or a Branch Update.
Is Your Website Safe? More Businesses Choose WAF for Website and App Protection April 12, 2016 - 8:27 AM A server attack can cause serious problems for a business, leading to a loss of income and reputation damage as customers try to visit, but are turned away. Today's savvy businesses work hard to keep their websites safe from attack, demanding the strictest security from their third-partY hosting providers and IT teams.
5 Steps To Improving Your Business's UX April 6, 2016 - 3:47 PM Regardless of what industry you're working in, it's very likely that competition within your business's field has only become more cutthroat in recent years. Indeed, thanks to the boom in ecommerce and the increasing ease with which people can connect with each other all over the globe, markets have become increasingly crowded as businesses go to battle over their potential customers.
NEC Launches New Codec to Solve the 4K Content Delivery Conundrum April 6, 2016 - 10:12 AM Seeing as how the question of how to deliver 4K content effectively while considering the average user's bandwidth restraints has been hanging in the air for some time, this may seem too good to be true. However, NEC claims its new product series is capable of encoding 4K video at approximately one five hundredth of its original size, while performing ultra-low delay encoding and decoding of around 99 milliseconds. It also supports BT.2020 and HDR, a next generation technology that expands the color gamut while increasing brightness.
A New Approach to Retailer/Supplier Collaboration: How Data Sharing Can Transform Profit Margins April 4, 2016 - 1:18 PM In the past, relations between suppliers and retailers may have grown contentious over as little as ten cents over a case of soda, and the cumulative effect of these little decisions are what managed the grocery retailer's business. Instead of making decisions on a unit price basis, retailers need to be looking at the total business. A change in management style is needed. The ability to share data and use analytics to improve joint decisions has the power to transform profit margins on both sides. In today's competitive markets, this new approach can make all the difference.
The System That Cried Wolf March 31, 2016 - 8:50 AM The post-mortem activity is just as messy. The current methods of having subject matter experts get into a war room, going through multiple product consoles and logs to identify the cause of an incident with a lot of finger-pointing and passing the buck that is inherent in the process, is putting companies at a severe disadvantage. This article will highlight how deep machine learning-based, root-cause analytics and predictive analytics technologies are helping organizations dramatically prevent such incidents, reduce mean time to repair and save brand reputation.
Microsoft: If You Can't Acquire Them, Invest In Them March 29, 2016 - 6:00 AM Conventional wisdom is often conventional because it's true, and Microsoft demonstrated as much by becoming a "significant participant" in a new strategic investment in a special company.
NTT Data to Buy Dell Services in $3 Billion IT Services Deal March 28, 2016 - 12:26 PM NTT Data and Dell are combining their managed IT services businesses in a massive acquisition valued at more than $3 billion. NTT will purchase Dell Services, absorbing its cloud, infrastructure, application and business outsourcing solutions while broadening its brand and global focus.
B2B Integration: Survival of the Fittest March 23, 2016 - 5:44 PM In 2016, what really separates B2B integration from legacy internal integration architectures such as enterprise service bus (ESB) or extract, transform, load (ETL)? Have the natural forces of technology and the resulting evolution of business applications simply rendered the distinctions meaningless? If so, which architecture has adapted to become the winner? Which is on the endangered species list? And have any evolved into the ungainly evolutionary equivalent of the giant three-horned chameleon?
Accenture Study Finds Companies Fail to Learn from Mistakes March 23, 2016 - 5:19 PM A recent survey from management consulting firm Accenture found that the number of U.S. companies that fail to learn from their past mistakes has nearly doubled from a similar survey the firm completed three years ago.
Informatica to Optimize Business Value from Data Lakes March 23, 2016 - 2:15 PM According to recent market research by Technavio, the big data enabled market will grow at a CAGR of 23 percent by 2019. The biggest driver for this growth is the increased data volume from organizations across virtually every sector and their need to improve business productivity and efficiency. So it is critically important to optimize business value from data lakes.
Intel Announces Support for Vulkan API March 22, 2016 - 6:00 AM Intel has announced its support - still in beta version - of its 6th-generation Intel Core and related processors for the new Vulkan 1.0 Application Programming Interface.
Preventing DNS-Based Data Exfiltration March 17, 2016 - 5:33 PM Several high-profile data breaches have been in the news recently. We read that millions of customer records are stolen, emails hacked, and sensitive information leaked. Most enterprises have multiple defense mechanisms and security technologies in place, such as next-generation firewalls, intrusion detection systems (IDSs), and intrusion-prevention systems (IPSs). Yet somehow malicious actors find a way to appropriate data. So what types of data are being stolen?
Rise in Security Awareness Pays Off Big for Wombat Security March 16, 2016 - 3:40 PM These days, a keen awareness of security matters is vital for continued growth. Those who don't have a good handle on security are more likely to be breached, their data stolen, and their public face irrevocably altered...and not for the better. That's given companies like Wombat Security Technologies some real growth potential, and Wombat has seen a three-year annual growth rate over 900 percent strong in the face of a more security-conscious business environment.
MegaPath Delivers All-in-One Security with Managed IPsec VPN and Unified Threat Management March 16, 2016 - 3:30 PM Provider of voice, data, security and cloud services in North America MegaPath has announced the release of a new solution, Managed IPsec VPN and Unified Threat Management (UTM). This new managed network and security service was designed to be simpler and faster than competing private networking solutions and is compatible with practically any commodity internet connection. Because of its low cost to get started, quick implementation and ease of management, it is well-suite to the needs of small to medium-sized businesses (SMBs).
It's Not Too Late to Migrate from Microsoft SQL Server 2005 March 16, 2016 - 2:07 PM Planning at a granular level can help mitigate many of the risks of a migration, and keeping the above considerations in mind when selecting migration software can help a business make the right move and migrate with confidence.
Dynatrace Releases DC RUM Version 12.4 March 14, 2016 - 1:22 PM As organizations move to hosted and application intensive IT services, analyzing the performance metrics in the context of the user's experience makes it possible to identify and prioritize the most pressing problems so IT teams can resolve them.