Sorry, we couldn't find any posts. Please try a different search.

POPULAR

Security Audits, Cyberattacks and other Potential Front Line Issues

Security Audits, Cyberattacks and other Potential Front Line Issues

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other ...
SCRaaS Screen as a Service

(SCRaaS) Screen as a Service and the Potential Possibilities

SCRaaS Screen as a Service Excuse me; I need to duck into this telephone booth and turn into Spreadsheet (non-gender ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Data Catalog: Enabling Self-Service Analytics

Data Catalog: Enabling Self-Service Analytics

Enabling Self-Service Analytics A Chinese proverb says, “The best time to plant a tree was 20 years ago; the second-best ...
Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
The Connected Car: The Unknown Hero of Automotive Innovation

The Connected Car: The Unknown Hero of Automotive Innovation

Connected Car Innovation Spanning the last decade, the automotive industry has seen an explosion of technological innovation which has, and ...
Adopting An Industry-Wide Red Line Movement

Adopting An Industry-Wide Red Line Movement

Red Line Movement Recently, I’ve been calling for an industry-wide adoption of the red line philosophy to help with the ...
Combining IoT Gizmo Kits With Your 3D Printer

Combining IoT Gizmo Kits With Your 3D Printer

IoT and 3D Printing The 3D printer in my cubicle keeps printing name tags without my name and only cube ...
The Evolution of the IoT Broker

The Evolution of the IoT Broker

The IoT Broker The concept of a cloud broker has changed and we now instead call it the Hybrid Cloud ...
3 Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

3 Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, ...