IT

Puzzling Layoffs by Cisco

Puzzling Layoffs by Cisco
August 14, 2014 No Comments »

Following in the footsteps of Microsoft, which recently announced some 18,000 job cuts, Cisco is planning a reorganization that will kick as many as 6,000 employees off the company’s rolls in the next year—about 8% of its staff. Despite a ... Read More »

Using Data to Transform Customer-Managed Relationships

Using Data to Transform Customer-Managed Relationships
August 13, 2014 No Comments »

With the rise of the always-on, always-connected consumer, traditional one-way customer relationship management (CRM) strategies simply don’t cut it anymore. But the vast majority of organizations still rely on this outdated strategy that fails to foster an open dialogue with ... Read More »

Is the Case for SSDs/Flash Memory Overblown?

Is the Case for SSDs/Flash Memory Overblown?
August 12, 2014 No Comments »

Solid-state drives (SSDs), which typically use NAND flash memory, offer a number of compelling advantages over their close competitor, hard-disk drives (HDDs). These benefits have led to some SSD proponents calling for all but wholesale conversion to flash memory in ... Read More »

“Professionalize” Information Security?

“Professionalize” Information Security?
August 7, 2014 No Comments »

Whatever the industry, you can always count on some voices calling for more government regulation—usually in the name of protecting consumers, securing infrastructure, stopping terrorism and putting an end to the torture of little children. Unfortunately, these efforts, although perhaps ... Read More »

Encryption: The Key to Proactive Security

Encryption: The Key to Proactive Security
August 6, 2014 No Comments »

Identity fraud cost American consumers $18 billion last year, with a new victim hit every two seconds, according to Javelin Strategy & Research. The prevalence of identity theft is a sobering reminder of the unending threats faced by enterprises, financial ... Read More »

Is the ARM-Based Server Opportunity Fading?

Is the ARM-Based Server Opportunity Fading?
August 5, 2014 No Comments »

ARM, the undisputed king of mobile computing, is hoping to extend its expertise in low-power processing to the data center—a policy that wisely exploits growing concerns regarding energy consumption. But the architecture is attempting to break into a market dominated ... Read More »

Mission-Critical Fire Protection: A Case of Mistaken Identity (Part 4)

Mission-Critical Fire Protection: A Case of Mistaken Identity (Part 4)
August 4, 2014 1 Comment »

(Also see Part 1, Part 2 and Part 3 of this series.) The third part of this series reviewed the more prevalent solution categories of fire protection design schemes for mission-critical facilities. It first covered consensus-based solutions, as they are ... Read More »

Recognizing Insider Threats

Recognizing Insider Threats
July 31, 2014 No Comments »

Regardless of whether one agrees with his actions and motivations, Edward Snowden showed last year—and continues to demonstrate—the impact that so-called insiders can have on an organization. Much of the focus of data center security is on protecting networks from ... Read More »

Unsafe Harbor?

Unsafe Harbor?
July 30, 2014 No Comments »

I’m no lawyer, or a huge fan of Windows, but a recent ruling by a U.S. magistrate may have some serious repercussions for those of us who are big fans of the free flow of information over the Internet. On ... Read More »

Development Without Borders

Development Without Borders
July 28, 2014 No Comments »

In the past five years, how, when and where consumers digest and collaborate on digital content drastically changed through the advent of smart devices, online streaming services and entertainment consoles that are no longer relegated strictly to gaming. As a ... Read More »