Sorry, we couldn't find any posts. Please try a different search.

POPULAR

Beth Desmond

When Innovation Ignites – The Promise of Cloud

When Innovation Ignites “I am tired of hearing about how Cloud will allow customer personalization — I want to feel it!” I ...
5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

Cloud-based Video Conferencing System Pitfalls A recent survey revealed that three out of four executives predict that video conferencing will ...
Cloud’s Challenge – Bigger than Twice the Stars in the Milky Way

Cloud’s Challenge – Bigger than Twice the Stars in the Milky Way

There are only 100 Billion stars in the Milky Way. Compare that to the over 200 Billion lines of COBOL ...
Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Hope for the best, prepare for the worst, and expect to be surprised. While that ...
Tips to Help You Get the Most Out of Big Data Analytics

Tips to Help You Get the Most Out of Big Data Analytics

Get the Most Out of Big Data Analytics The amount and type of data related companies continues to increase each ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
The Unintended – and Intended – Consequences of Cloud Data Sovereignty

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that ...
The AWS Cloud Goes Underground at re:Invent

The AWS Cloud Goes Underground at re:Invent

As you wander through the AWS re:Invent campus, take a minute to think about your expectations for all of the elements that ...
Key Takeaways From Dyn's DDoS Attack

Key Takeaways From Dyn’s DDoS Attack

DDoS Attack Takeaways  If you tried to access some of the world’s most popular websites, such as Twitter, Spotify, CNN, ...
infosec

Mind The Gap: Cybersecurity In Corporate Training

Cybersecurity In Corporate Training Over the years, I have had the opportunity to travel often for my career. Of all ...