Rising Demand for Cloud-Based Video Conferencing
It’s all about connecting. With the distances involved for telecommuters and far-flung members of your staff, calling a meeting ought…
DevOps Professionals’ Survey Shows Salary Trends & Job Security
DevOps, or the practice of operations and development engineers working together throughout the entire service lifecycle, is a relatively new,…
Taming Big Data
Simply stated, the best application of Big Data is in systems and methods that will significantly reduce the data footprint.Why would…
How Each Game of Thrones House Would Approach Corporate IT [INFOGRAPHIC]
Are you a Game of Thrones fan? If so, you understand the all-encompassing fandom and how absolutely everything can be…
A Better Way to Model Data
Over the last three decades ERP, CRM, and Analytical systems have evolved. However the way in which those systems store…
IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public…
Malicious Tool Provides Attackers with a New Type of Zombies
An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in…
Media & Entertainment Industry Casting Call: High Resolution Digital Assets Offer New Role for Petabyte Storage
Data size is quickly outpacing storage space in the media and entertainment industry, and object-based storage can play a pivotal…
How to Clean Up the Mess: Surviving a Data Breach
Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took…
How to Bolster the Skills of Your In-house IT Team
Over-staffing an IT department is as undesirable as under-staffing – the solution is to right-size to cover normal operations but…

