How four companies improved storage, backup, telephony, security, scalability, IT efficiency, and the bottom line by moving to the cloud
Stories by Bob Violino
Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered.
Serverless computing is designed to automate infrastructure provisioning and eliminate the burden of server management.
Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.
Hyperconvergence is appealing for more workloads now that systems can independently scale compute and storage capacity via a disaggregated model. The ability to create a hyperconverged solution using NVMe over fabrics is another draw.
Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure.
Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.
Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.
If you think the proliferation of mobile devices changed the concept of the network edge, get ready for the emerging Internet of Things (IoT), where a network-connected sensor could be located on top of a mountain, in a corn field or even in the ocean.
From data concerns to staffing needs to technology combinations, data analytics misconceptions abound. Here’s a no-bull look at how to leverage data science to deliver bona fide business results.
Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.
The era of installing software from a CD or from a datacenter’s server is coming to a close, as internet-delivered software makes applications available anywhere, anytime
The servers, operating systems, core software, and networking you’ve long deployed in your datacenter is moving outside your walls to the public cloud
Data mining is the automated process of sorting through huge data sets to identify trends and patterns and establish relationships
As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.