IT

Remote Data Centers: Blending the Boundaries of Metro-Regional Networks

Remote Data Centers: Blending the Boundaries of Metro-Regional Networks
August 21, 2014 No Comments »

Many new data centers being built today are being located at greater distances from typical enterprise users than in the past. Content data centers initially were built in and around metro core areas to provide the most effortless access to ... Read More »

Bridging the Gap Between Data Governance and the Rest of the Business

Bridging the Gap Between Data Governance and the Rest of the Business
August 20, 2014 No Comments »

Effective data governance polices help businesses realize objectives like meeting audit and regulatory requirements, becoming e-discovery ready, and keeping data-storage costs under control. But data governance is a relatively young industry comprising largely uncharted territory. It has none of the ... Read More »

Why Passwords Won’t Die

Why Passwords Won’t Die
August 19, 2014 No Comments »

The crusade against passwords has been raging for years, and as the capabilities of various devices increase, alternatives become more feasible. But the case for eliminating passwords is less clear than it may seem, and a headlong rush into an ... Read More »

Is Your Network Provider Holding You Hostage in Its Data Center?

Is Your Network Provider Holding You Hostage in Its Data Center?
August 18, 2014 No Comments »

The colocation landscape in North America continues to evolve, shaped by a number of industry trends. Colocation in Canada today is barely recognizable relative to where it stood 18 months ago, influenced most heavily by industry consolidation. In this short ... Read More »

Puzzling Layoffs by Cisco

Puzzling Layoffs by Cisco
August 14, 2014 No Comments »

Following in the footsteps of Microsoft, which recently announced some 18,000 job cuts, Cisco is planning a reorganization that will kick as many as 6,000 employees off the company’s rolls in the next year—about 8% of its staff. Despite a ... Read More »

Using Data to Transform Customer-Managed Relationships

Using Data to Transform Customer-Managed Relationships
August 13, 2014 No Comments »

With the rise of the always-on, always-connected consumer, traditional one-way customer relationship management (CRM) strategies simply don’t cut it anymore. But the vast majority of organizations still rely on this outdated strategy that fails to foster an open dialogue with ... Read More »

Is the Case for SSDs/Flash Memory Overblown?

Is the Case for SSDs/Flash Memory Overblown?
August 12, 2014 No Comments »

Solid-state drives (SSDs), which typically use NAND flash memory, offer a number of compelling advantages over their close competitor, hard-disk drives (HDDs). These benefits have led to some SSD proponents calling for all but wholesale conversion to flash memory in ... Read More »

“Professionalize” Information Security?

“Professionalize” Information Security?
August 7, 2014 No Comments »

Whatever the industry, you can always count on some voices calling for more government regulation—usually in the name of protecting consumers, securing infrastructure, stopping terrorism and putting an end to the torture of little children. Unfortunately, these efforts, although perhaps ... Read More »

Encryption: The Key to Proactive Security

Encryption: The Key to Proactive Security
August 6, 2014 No Comments »

Identity fraud cost American consumers $18 billion last year, with a new victim hit every two seconds, according to Javelin Strategy & Research. The prevalence of identity theft is a sobering reminder of the unending threats faced by enterprises, financial ... Read More »

Is the ARM-Based Server Opportunity Fading?

Is the ARM-Based Server Opportunity Fading?
August 5, 2014 No Comments »

ARM, the undisputed king of mobile computing, is hoping to extend its expertise in low-power processing to the data center—a policy that wisely exploits growing concerns regarding energy consumption. But the architecture is attempting to break into a market dominated ... Read More »