IT

Six Ways Big Data Could Damage Your Business—and What to Do About It

Six Ways Big Data Could Damage Your Business—and What to Do About It
January 28, 2015 No Comments »

As every marketer knows, the era of big data is here, and with it comes a huge smorgasbord of opportunities to connect with customers in amazing new ways. Vast quantities of customer information are now flowing into businesses from social ... Read More »

PCs Are Here to Stay—And So Is the Keyboard

PCs Are Here to Stay—And So Is the Keyboard
January 22, 2015 No Comments »

On a number of occasions, I’ve addressed the common refrain that “the PC is dead.” Well, it’s not dead, and the forecasted uptick in shipments combined with cooling growth in the mobile market suggests that, as I predicted, the various ... Read More »

Can Patent Trolls Be Stopped Without Systemic Reform?

Can Patent Trolls Be Stopped Without Systemic Reform?
January 20, 2015 No Comments »

Patent trolls are widely despised, but efforts to curb their more egregious behavior without undercutting the rationale of the patent system run into numerous difficulties. Yet with so much time, effort and money invested in patents—the U.S. Patent and Trademark ... Read More »

2015 Predictions: Data Science and Hadoop and In-Memory, Oh My!

2015 Predictions: Data Science and Hadoop and In-Memory, Oh My!
January 19, 2015 1 Comment »

As we all know, big data is not a new term, nor is it a new reality. In 2014, however, we saw companies start to truly embrace it. In fact, some have so much data that they don’t know what ... Read More »

IT Degrees Are Still the Career Ticket

IT Degrees Are Still the Career Ticket
January 15, 2015 No Comments »

If Steve Jobs and Bill Gates did it, why can’t everyone else? Fortunately or unfortunately, not everyone is a Steve Jobs or Bill Gates. Achieving a successful career in IT, as in so many other fields, is less about what ... Read More »

Offering Security as a Service: Three Best Practices

Offering Security as a Service: Three Best Practices
January 14, 2015 No Comments »

Verizon’s 2014 Data Breach Investigations Report revealed nine different patterns to data breaches, which accounted for 92% of the 100,000 security incidents the company has investigated. DDoS attacks played a role in six of the eight highlighted industries, with professional ... Read More »

Technology, Big Brother and Charlie Hebdo

Technology, Big Brother and Charlie Hebdo
January 13, 2015 No Comments »

In the wake of the Charlie Hebdo massacre, politicians from Europe and elsewhere—in the same breath that they blab about freedom—have called for more restrictions, including even on certain kinds of encryption. In this bloody intersection of technology, journalism and ... Read More »

Identifying the Top Security Risks Associated With Wearables

Identifying the Top Security Risks Associated With Wearables
January 12, 2015 No Comments »

Just as the 1990s were embodied in floppy disks, compact cassettes and rotary dials, today’s symbolic attribute is wearables. Owing to tremendous advances in the Internet of Things market, more and more people are interested in tracking their daily activities. Chasing life ... Read More »

Internet of Things (IoT): Overdue or Overboard?

Internet of Things (IoT): Overdue or Overboard?
January 8, 2015 No Comments »

Numerous reports about the goings on at the 2015 International CES have focused on the Internet of Things (IoT), including the usual smattering of absurd gadgets that probably won’t go anywhere. But one of the themes is networked computing everywhere, ... Read More »

Protecting Data Center Workloads in the Cloud

Protecting Data Center Workloads in the Cloud
January 7, 2015 No Comments »

The emergence of cloud infrastructure, both public and private, has dramatically altered the way the data center operates today. It has increased agility, scalability and reliability in the data center, while simultaneously lowering costs. But there is one area where ... Read More »