Why does the concept of airspace matter in the drone world?

By Scott Andersen | November 23, 2017

The Airspace Drone World Recently I was invited to continue a discussion started last year. The conversation was a roundtable of now High School Seniors. All of them participate in the technology program of a Maryland School District. The originally

This Amsterdam Bank Wants To Hack … Itself?

By Kayla Matthews | November 21, 2017

Bank Wants To Hack … Itself? With instances of professional hacking and data leaks making the news every year, it’s no secret that cybersecurity has become a major concern. How does a corporation ensure its cybersecurity remains impenetrable in a world

Data Catalog: Enabling Self-Service Analytics

By Cloud Syndicate | November 21, 2017

Enabling Self-Service Analytics A Chinese proverb says, “The best time to plant a tree was 20 years ago; the second-best time is now”.  Let’s assume you’re already up and running with a big data Hadoop platform for advanced analytics use-cases. 

Survey: 87% of Businesses Are Confident About Cybersecurity

By Daniel Matthews | November 20, 2017

Businesses Confident About Cybersecurity In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses are “confident in their cybersecurity preparedness.” The survey, from SolarWinds MSP, included 400 businesses from

AI In Telecom: Intelligent Operations is the New Norm

By Ronald van Loon | November 17, 2017

Intelligent Operations The move towards an intelligent world is faster and more rapid than it ever was before. The increase in this transition has been propagated through the role of several high key stakeholders that have redefined the way we

Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

By CloudTweaks | November 17, 2017

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination

V2V? Platoons? Your First Taste of Robocar is a Truck

By John Pientka | November 16, 2017

Robo Trucking You are driving down the interstate. Ahead is an 18-wheeler struggling up the grade. You swing out to pull around him and give it the gas. What the $#!%? On your right is a wall of trucks –

Why Big Data is the Key to Relationship Marketing

By Shachar Shamir | November 16, 2017

Big Data Relationship Marketing When you think about big data, you might find that marketing is one of the first uses that comes to mind. Rightly so – it’s an incredibly powerful tool for marketing companies seeking to analyze large-scale

A Quick and Dirty Guide to GDPR Compliance

By CloudTweaks | November 15, 2017

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although its goal to protect consumer data is admirable, about a third of global companies don’t know whether

conferencing cybersecurity

Is Your Conferencing System a Cybersecurity Weak Link?

By Bobby Beckmann | November 14, 2017

Video Conferencing Vulnerabilities At home and in the office, the Internet of Things (IoT) has brought us new heights of connectivity and convenience. Yet recent years show that the connected devices that have opened up new doors for us have

How to Improve the Backup Success Rate of Data Centers?

By Cloud Syndicate | November 14, 2017

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing across various tiers of data centers. This impacts datacenters heavily on revenue loss, SLA-based penalties, and customer experience. Furthermore, loss

Evolving the enterprise network architecture in the era of hybrid cloud

By Mark Casey | November 13, 2017

Enterprise Network Architecture The use of cloud infrastructure and SaaS applications has been a key element in helping companies improve business processes. One missing ingredient to a better performance is still a truly agile network. CEOs don’t have to start

CA-comic

TECH TRAINING

TECH EVENTS

REPORTS

POPULAR

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of ...
3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to ...
Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Hope for the best, prepare for the worst, and expect to be surprised. While that ...
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Magical

It’s Not Technology, It’s Magic. We Are Increasingly in a Magical Realm. Are Your Customers?

It’s Not Technology, It’s Magic “Any sufficiently advanced technology is indistinguishable from magic.” – Arthur C. Clarke. Are your customers ...
The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift to Microservices The shift in application development strategies is moving from monolithic design to isolated and resilient components ...
AI

These U.S. Counties Are The Best At Using AI For Their Citizens

AI For Their Citizens Every year, the Center for Digital Government conducts a survey of every county in the U.S ...
Scale your Windows Azure application

Understanding The Importance Of A Flexible Hybrid Cloud Solution

Flexible Hybrid Cloud Solution The cloud computing revolution continues to gather pace, and more and more businesses are coming on-board ...
Ransomware's Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to ...
AT&T Pinpoints 4 Key Elements To Achieving Security With The Internet of Things

AT&T Pinpoints 4 Key Elements To Achieving Security With The Internet of Things

Internet of Things Security The Internet of Things (IoT) is rapidly becoming a part of many of our business processes, ...