How Microsoft is Protecting the Privacy of its Customers from the NSA
Over the past year, the spotlight has been on the NSA and its spying techniques. It seems like we're getting…
How to Crack SSH Logins to Get to Your Data [VIDEO]
The reality is this: if your computer is connected to the Internet, people will attempt to hack it. Across the…
Privacy Threats You Need to Know About
As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while…
How to Steal Data by Enabling a Remote Desktop [VIDEO]
When it comes to stealing data, hackers can get especially creative. More often than not, hackers employ techniques that allow…
How MapR’s M7 Platform Improves NoSQL and Hadoop
The M7 Edition. Sounds like a high performance sports car, doesn’t it? The M7 Edition. Sounds like a high performance…
Now Lawyers Can Use the Cloud, Too
Guest post written by Shawn Gordon. "What's a Google Drive?" Guest post written by Shawn Gordon. "What's a Google Drive?" I was having lunch recently…
Is BYOD Stealing the Big Data Limelight?
If you had to name some of the biggest trending terms in the tech space today, big data would certainly…
Enterprise Data Trends to Watch for in 2014
Technology and data can make or break a business. With the right management, enterprise data is a valuable tool and…
How the Financial Services Industry Should Use Big Data to Regain Trust
If there is any industry that can benefit from big data, it is the financial services industry. Of course the…
The Importance of Failover Connectivity in Today’s Environment
Nowadays, many businesses are moving to the cloud. This migration provides companies with many benefits, such as an increase in…