Sorry, we couldn't find any posts. Please try a different search.

POPULAR

Want to dip your toe into the cloud? Start with Disaster Recovery

Want to dip your toe into the cloud? Start with Disaster Recovery

Disaster Recovery and the Cloud Migrating to the cloud can be a daunting task. First you have to go through ...
Why Are Hackers So Interested In Your Medical Data?

Why Are Hackers So Interested In Your Medical Data?

The Interest In Medical Data The term “hackers” might bring to mind visions of dark basements, powerful computers and people ...
For AI to Change Business, It Needs to Be Fueled with Quality Data

For AI to Change Business, It Needs to Be Fueled with Quality Data

Quality Data and AI There’s no doubt that AI has usurped big data as the enterprise technology industry’s favorite new ...
How IoT and OT collaborate to usher in the data-driven factory of the future

How IoT and OT collaborate to usher in the data-driven factory of the future

The Data-driven Factory The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains ...
Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Lessons for Corporate Board Members from the Colin Powell E-mail Hack

Corporate Board Member Security It’s every company’s worst nightmare: waking up to find your confidential company information plastered across The ...
The Need For Planning In The Drone World

The Need For Planning In The Drone World

The Drone Highway Do we need to plan the sky? Given the current state of drones that seems a bit ...
Want To Save The Planet And Be Green? Then Go Cloud!

Want To Save The Planet And Be Green? Then Go Cloud!

Going Green Data Centers (DC’s) – they are hungry beasts. Ten years ago the EPA estimated that DC’s consumed 61 ...
The Return of the CIO

The Return of the CIO

Not long ago pundits were writing the obituary for CIO’s. They were becoming as archaic as the VP’s of Electricity ...
Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only ...
Data Catalog: Enabling Self-Service Analytics

Data Catalog: Enabling Self-Service Analytics

Enabling Self-Service Analytics A Chinese proverb says, “The best time to plant a tree was 20 years ago; the second-best ...