Sorry, we couldn't find any posts. Please try a different search.

POPULAR

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored ...
Don't be held hostage by Ransomware: 7 Prevention Tips

Don’t be held hostage by Ransomware: 7 Prevention Tips

Ransomware Prevention Tips Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, ...
Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Seeing Through An Animal’s Eyes Computer Vision and Facial Recognition have gone from rare and difficult to increasingly available thanks ...
SCRaaS Screen as a Service

(SCRaaS) Screen as a Service and the Potential Possibilities

SCRaaS Screen as a Service Excuse me; I need to duck into this telephone booth and turn into Spreadsheet (non-gender ...
The Return of the CIO

The Return of the CIO

Not long ago pundits were writing the obituary for CIO’s. They were becoming as archaic as the VP’s of Electricity ...
Data as a Service

Data as a Service: 5 Strategies to Transition How You Access Data

Data as a Service Information wants to be free — at least that’s the saying. And like any good saying, ...
Coping with the Internet of (Risky) Things

Coping with the Internet of (Risky) Things

Internet of (Risky) Things The train appears to have left the station, and device manufacturers – makers of everything from ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...