Sorry, we couldn't find any posts. Please try a different search.

THOUGHT LEADERSHIP ARCHIVE

Do Not Rely On Passwords To Protect Your Online Information

By John Barco

Do Not Rely On Passwords Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience

Move Over Brick And Mortar, Education-As-A-Service Is Taking Over

By Scott Skinger

Education-As-A-Service As Bob Dylan once said, “the times they are a-changin’.” Its a verse that sticks like glue in the back of my mind when I reflect on the technology landscape today. Just a few years ago, data analytics services

New Year, New Cloud? Managing “Extreme Data”

By David Eisner

Managing Extreme Data Companies are familiar with the concept of “big data”; every piece of information they generate from day-to-day business processes or when interacting with customers is considered valuable, so long as these pieces are quickly analyzed and converted

3 Challenges of Network Deployment in Hyperconverged Infrastructure

By Ariel Maislos

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of

IT Service Management Strategy

Automation and the IT Service Management Strategy

By Brian Day

IT Service Management Strategy It’s true. The full potential of automation cannot be fully realized until it is informed and supported by an effective IT service management strategy (ITSM) that encompasses your entire IT environment, as well as business objectives,

John Barnes

Technology Predictions of the Future

By John Barnes

Cloud Computing Predictions In 2010, we have seen a transformation of skeptics from their belief that cloud computing is suited mainly for small to mid-sized business, to a general acceptance that “the cloud” is everywhere. However, we have also seen

Cloud Proving To Be Major Resource For Hedge Funds

By CloudTweaks

Major Resource for Hedge Funds As we near the end of Q1 2013, hedge fund managers continue to generate higher returns. Following several years of sub-par performances from global hedge funds, investment managers have turned to cloud computing and infrastructure-as-a-service

The Economics, Concepts and Fundamentals of Cloud Computing

By Gopan Joshi

Fundamentals of Cloud Computing Addressing security concerns of the Public Cloud Enthusiasm for cloud computing has as much to do with economics as technology. Growth in the number of applications and the volume of data that must be managed have

Breakthroughs in Clinical Trials Utilizing the Power of the Cloud

By Craig Morgan

Cloud Computing and the Medical Field Clinical trials play an essential role in the drug development process by effectively demonstrating the efficacy and safety of a pharmaceutical compound. Although lead by scientific endeavor with patient safety and therapeutic benefits in mind,

My Fascination with Amazon Go

By Ken Tsai

Amazon Go Recently, Amazon unveiled the world’s first completely self-service, no checkout, grocery store — and it’s really captured the public’s imagination. Lines have stretched around the block to try the new, “no-line” experience. It’s the new topic of water cooler, coffee shop,

Technology Certification Courses

Top Five Technology Certification Courses To Choose From In 2018

Technology Certification Courses Gartner predicts that the global public cloud services market is projected to grow by 55 percent in the ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses ...
Biometric Authentication

Passwords: More Secure Than Biometric Authentication?

Biometric Authentication Biometrics has long granted or denied access to secure things like premises and vehicles. Now it is being ...
David

De-Archiving: What Is It and Who’s Doing It?

De-Archiving I first heard the term “De-Archiving” a few months ago on a visit to a few studios in Hollywood ...
20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

Cloud CMS Wordpress Alternatives Content management systems (CMS) have grown exponentially in recent years. Their number and features have exploded ...
SD Wan Speeds

Debunking some common SD WAN myths

Common SD WAN Myths There are few buzzwords in the networking world as current as ‘SD WAN’ – and depending ...
Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial ...
Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? In a recent study, almost all the businesses surveyed stated that big data analytics were ...
Numeraire Cryptocurrency

Digital Cashless Society: Dystopian Nightmares or Utopian Dreams

Digital Cashless Society A truly digital cashless society was long the realm of dystopian nightmares (or utopian dreams depending on ...