Sign up | Login with →

IT

exclusive

It’s Your Life, Starring Your Data

July 27, 2015 by Tamara Dull
1

At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]

exclusive

Managing Big Data? Make Sure You Know the Challenges

July 27, 2015 by Gunjan Tripathi
1

The ability to collect massive amounts of data has grown exponentially with the advent of the Internet and the number of people who use it. Data collection happens almost as a side effect of other computing activities.[read more]

Strategic Methodologies That Will Improve Your IT Department’s Infrastructure

July 23, 2015 by Simon Mitchell

Effectively future proofing your Linux system is the end result of implementing two important strategies throughout your company. These strategies both revolve around your in-house IT team and their skillset. First, you should identify whether or not your IT department has the modern skillset needed to keep up to date with developments in Open Source, Linux and the risk of cyber threats. There are three important roles you should have within your organisation.[read more]

exclusive

Top 10 Social Engineering Tactics

July 22, 2015 by Gunjan Tripathi

Social engineering is the process of exploiting the weakest part of your security system: the human factor. Social engineers accomplish their goals by a combination of technical sleight-of-hand, and using personal contact to gain trust. Surprisingly, many of these methods do not use technology at all, or only use technology as an adjunct to personal contact.[read more]

exclusive

The Business Takeaways From the Recent Baseball Hacking Scandal

July 17, 2015 by Rick Delgado

Issues related to cyber security are certainly not new, especially in the business world. In recent years, serious concerns have arisen as companies have struggled to overcome the security threats they face. After major security breaches at businesses like Target, Home Depot, and Sony, the sad reality is that many breaches are difficult to avoid, so another story about cyber security woes shouldn’t have come as a surprise.[read more]

UNIX Vs Linux: How Do They Measure Up?

July 16, 2015 by Simon Mitchell

Linux and UNIX are very similar to each other, but they have some common differences – discover what they are in this blog to find out which one is right for your organisation.The history of the UNIX operating system dates back to 1969. Since then it has developed and evolved with the creation of a number of different versions and...[read more]

Get the Most Out of Your Oracle Application

July 6, 2015 by Xander Schofield

With so many features and benefits it’s possible to get the most out of your oracle application. Oracle is used in virtually every large application due to its ability to integrate technology and pre-integrated, comprehensive business applications and the fact that fixing query performance can also be done fast.[read more]

Best Practice Linux Guide: Your Cloud Strategy

July 3, 2015 by Simon Mitchell

The Cloud is becoming an all-encompassing presence on the Internet. Whether it’s public, private or hosted, your organisation will undoubtedly be under pressure to not only adopt some form of Cloud strategy to keep up with competitors but will also increasingly experience internal pressures to adopt new tools and techniques such as continual integration tools and concepts such as containers.[read more]

exclusive

7 Key Features IT Should Look for in Enterprise Mobility Software

July 2, 2015 by Daniel Kraft

It’s safe to say that the traditional model of “going to work” is a ticking time bomb. Service providers and freelancers are replacing full-time employees, and people are changing careers faster than ever. Companies require employees to be available 24/7, but they can align work with the priorities of their personal lives, working from many places. Clearly, organizations are undergoing some soul-searching for the ideal structure, and mobility is key.[read more]

exclusive

5 Hidden Reasons Your IT Team Is Always Late and Over Budget

June 30, 2015 by Baron Schwartz

It’s hard to pinpoint why IT teams are performing poorly because the reasons are hidden. Here are five main issues that may reside deep under your IT team’s skin.[read more]

exclusive

A Day Late and Big Data Architecture Short

June 29, 2015 by Paul Barsch

In the mad-dash to “do something” in big data without a strategy, IT managers and business users alike seem to continuously jump on the latest technology (today it’s Spark) and thus become inevitable case studies for Gartner’s well documented hype cycle.[read more]

exclusive

Adopting a User Behavior Analytics (UBA) Solution

June 25, 2015 by Idan Tendler

The key to stopping hackers & rogue employees already exists in the enterprise in the form of user related data repositories. With the right analytics that focus on user behavior, security analysts can gain much needed context to better understand the insider threats they face on a daily basis.[read more]

Taking the Cloud Apart: What Works for Your Business?

June 25, 2015 by Simon Mitchell

Just like real clouds ‘The Cloud’ is made up of many clouds, some overlapping and some merging into others with no obvious boundaries. Mouse-Over each for an explanation. A Standard Operating Environment (SOE) and a Management Platform (MP) are at the centre of modern IT. With an SOE you can provision new servers in seconds and remove them when you no longer need them. An MP is essential for controlling an infrastructure that may run into thousands of virtual machines.[read more]

exclusive

Big Data Hadoop Use Cases in the Oil and Gas Industry

June 22, 2015 by Dave Mendle
1

While U.S. oil production has begun expanding - so much so that the International Energy Agency predicts that by 2016 the US will surpass Saudi Arabia and Russia - the rest of the world’s oil production has ceased to expand. In an effort to streamline and optimize oil and gas production methods, advances in instrumentation, process automation, collaboration, and data management are being developed.[read more]

exclusive

How Big Data Affects Us Through the Internet of Things

June 19, 2015 by Dave Mendle

Although big data is ever-present in our lives, it can be difficult to understand how much it really has changed our day-to-day living. Let’s take a closer look at how big data has weaved its way into the lives of many consumers today, via the Internet of Things (IoT).[read more]