Sign up | Login with →

IT

Migrate from Proprietary Software to Linux to Create Cost Savings

August 28, 2015 by Simon Mitchell

Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linuxsoftware programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance.[read more]

6 Steps to Data Disaster Recovery [INFOGRAPHIC]

August 28, 2015 by Aaron Aders

re than 70 percent of companies are not currently confident in their ability to restore data in the case of an outage. This new guide from Expedient outlines 6 Steps to Disaster Recovery Preparedness. With planning and testing, IT leaders can prepare for a disaster before it strikes.[read more]

Big Data Security: Why It’s a Problem and What We Can Do About It

August 26, 2015 by Tiffany Rowe
1

This is unequivocally the era of big data — but it is not necessarily the era of big data security. The terrifyingly massive breaches of major corporate databanks, including Home Depot, Target, Niemen Marcus, and most recently Ashley Madison, reveals that most big data collectors are not doing nearly enough to protect their precious information from prying eyes. Without serious changes in security protocols across the board — from consumers to producers to vendors — big data will only increase in its appeal as a target for malicious hackers.[read more]

exclusive

A Closer Look at Gamification in Healthcare

August 25, 2015 by Jessica Oaks

By now it’s very apparent that technology has had a major impact on shaping the general healthcare industry. With smart devices sweeping everyday life, patients and medical staff capitalize on the benefits of connected technology in a multitude of ways. Particularly mobile technology advancements in healthcare have put the integration of gamification at the forefront.[read more]

exclusive

Spotlight on Sync

August 24, 2015 by Shawn Gordon

The founders of Sync, are also the founders of a company Netfirms in Canada, a premier hosting service there. Something that was an issue with them over time was the lack of full security with file sharing services like Dropbox, so after they sold Netfirms, they set out to make an easy to use, multi platform and fully secure, encrypted and unreadable by the hosting service file sharing system, they have realized that with Sync.[read more]

exclusive

Less Dogma Equals Better Decision Making

August 17, 2015 by Paul Barsch
2

Some of the biggest breakthroughs come as a result of challenging assumptions; especially those that are commonly accepted. But first you'll need to put processes, systems and people in place to continually overcome preconceived notions.[read more]

exclusive

5 Game Changers for the Modern Data Warehouse

August 13, 2015 by Rick Delgado

The technological world is moving fast, and many IT departments are scrambling to keep up with it. At the heart of most IT operations is the data warehouse, and one of the chief responsibilities of managing it is to ensure the data warehouse is kept up to date, ready to handle any new demands that arise. This task can be difficult at times, especially considering how revolutionary some advances are.[read more]

The Era of Cloud Computing: An Interactive Timeline

August 12, 2015 by Richard Thelwell

The term “cloud computing” may be commonly uttered in businesses all over the world, but its complex history is less well known. Our interactive timeline explores the history of Cloud Computing and its future.[read more]

exclusive

Rent-A-Botnet Free Cloud-Based Servers May Encourage Cyber Warfare

August 11, 2015 by David Schwartz

As the Internet has become an integral part of our economic and personal lives, hackers have found new ways to exploit the technologies that promote and support it. Google, Heroku, Cloud Foundry, Cloud Bees and other hosting providers make it possible to host applications with nothing more than an email address. This scenario gives hackers the option to auto-generate thousands of email addresses, and create free accounts for these services. The servers can then be used for a number of cyber attacks.[read more]

Six IT Essentials for Life Science Systems Integration

August 11, 2015 by Glenn Johnson

Companies of all sizes, from early-phase start-ups to Big Pharma must continuously collaborate to ensure quality, comply with regulations, and mitigate risks in each stage of the product development life cycle. Here are six key requirements for a future-proof integration platform that can help meet the demands of life science organizations.[read more]

exclusive

How Top Companies Use Video Conferencing

August 10, 2015 by Sean Mallon

Quality video conferencing services are creating extremely useful business tools that can be used in many new and exciting ways. Any business can use this technology to take advantage of the same boost in cohesion, productivity and progress as the top companies.[read more]

Amazon's Cloud Computing Giant is Getting Closer to Full Takeover

August 7, 2015 by Xander Schofield

Not many know that Amazon Web Services, Amazon’s cloud computing franchise, is just less than a decade in age and already taking a commanding lead among its peers. Amazon has indicated that in the first quarter of 2015, it made $1.57 billion with a profit of $265 million from 2014’s $1.05 billion sales within the first quarter and a profit of $245 million. Nonetheless, Amazon Web Services’ margins had dipped to 16.9 percent from those reported in 2014’s first quarter that stood at 23.3 percent.[read more]

exclusive

As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]

exclusive

It’s Your Life, Starring Your Data

July 27, 2015 by Tamara Dull
1

At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]

exclusive

Managing Big Data? Make Sure You Know the Challenges

July 27, 2015 by Gunjan Tripathi
1

The ability to collect massive amounts of data has grown exponentially with the advent of the Internet and the number of people who use it. Data collection happens almost as a side effect of other computing activities.[read more]