Sign up | Login with →

IT

exclusive

Cyber Security: Locking Out the Grinch from Your Application Network

December 18, 2014 by Bob Dvorak

Security.

How do you leave your chimney open for Santa while keeping the Grinch safely locked out? The right application management strategy can help outline where vulnerabilities lie and how to fix security weaknesses, minimizing your organization’s overall attack surface.[read more]

Signs the Cloud Isn’t Right for Your Business

December 17, 2014 by Kyle Cebull

What's different about you?

When you work on files in the cloud that are very large, it can be difficult to work on them through a browser or remote connection. Companies that do graphic design or deal with big data can sometimes have this difficulty and may want to reconsider the cloud for their organization.[read more]

exclusive

New Generation of Technology Will Rely on Analytics, Study Shows

December 16, 2014 by Jeff Brown

“We are in a time of profound change for business, technology and IT leadership,” said Leon Kappelman, Ph.D., Professor at the University of North Texas and SIM’s lead researcher and Professor of Information Systems at the University of North Texas. “Results show the focus of IT organizations and their leaders is changing, with a new emphasis on business value, strategy, innovation and speed.”[read more]

exclusive

From Police to Partner: The Changing Role of IT

December 12, 2014 by Tom Smith

IT security / shutterstock

IT professionals must adopt a new role that strikes a balance between employee needs and preferences and security. Here are four things you need to effectively become a partner rather than a policeman, while maintaining a secure company infrastructure.[read more]

exclusive

Changing Your Mind About Big Data Isn’t Dumb

December 8, 2014 by Paul Barsch

Risky Business column.

While big data technologies have enjoyed plenty of hype, there’s a new reality setting in regarding getting more value from big data investments. With this in mind, it's OK to step back for a moment, pause your programs for a time if necessary, and—yes, even change your mind about big data.[read more]

exclusive

3 Cloud Misunderstandings That Can Hamper Migration

December 8, 2014 by Suraj Kumar

Cloud.

Like any other technology, the cloud has strengths and weaknesses and it’s important not to forget this. Problems can occur when your sole focus of attention is on the benefits the cloud can bring to your business, and you choose to ignore the weakness of the cloud model you have chosen.[read more]

exclusive

Scary Security Concerns With the Internet of Things

December 5, 2014 by Rick Delgado

IoT.

Internet security is already a multibillion dollar industry, and having to add new features in order to grant greater protection for the new IoT promises to make this industry ever more expansive. However, this means that the burden of promising to provide the utmost in security is even greater than before.[read more]

exclusive

Leveraging the Cloud to Optimize Software Testing

December 4, 2014 by Anand Srinivasan

Software testing.

Like every other aspect of technology servicing, software testing too has been seeing a gradual migration to the cloud over the past decade. A 2010 study by Fujitsu revealed that testing and development tools were the second most widely used cloud applications (website services being the first).[read more]

Dynamic Cybersecurity Needs: Reassessing Security

November 30, 2014 by Thu Pham

cybersecurity needs

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]

Big Data Ethics and Your Privacy [INFOGRAPHIC]

November 29, 2014 by Mark van Rijmenam

Internet saturated nations

Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]

exclusive

Mobile Apps, Business Apps and Network Security

November 28, 2014 by Rick Delgado

mobile apps

Today’s cybercriminals are inventive. They’re creative and find an increasing number of ways to access and exploit personal and professional information. Criminals aren’t respectful of the work-life balance. If we use our personal computer at work, and then bring it home for personal use, our work information on the device is still up for grabs.[read more]

Intacct Improves Cloud of Collaboration, Payments and Reporting

November 27, 2014 by Robert Kugel

Top-ranked tech innovation priorities

Financial management software provider Intacct recently held its fourth annual user conference. The company used the occasion to announce Intacct Collaborate, a capability built into its software that enables finance and accounting organizations to work together to answer questions or resolve issues while performing a process.[read more]

Healthcare Insurance Regs Must Keep Up with Tech Advances

November 26, 2014 by Joshua New

health tech / shutterstock

The promise of Apple's HealthKit: as adoption of wearables increases and health insurers rely more heavily on biometric data, consumers and industry alike will benefit from better healthcare outcomes and lower costs. However, this healthcare advance won’t happen unless insurance regulations keep up with the technology.[read more]

"Tech Savvy" Means "Customer Savvy" for Midsized Companies

November 26, 2014 by Julie Hunt

Wowing customers

Technology is no longer simply back office automation or work productivity tools addressing the day to day of the business. When companies combine technologies with effective practices and processes around meeting customer needs on every level, competitive edge and revenue growth usually follow as natural outcomes.[read more]

Healthcare Cloud to Grow Exponentially in US by 2020

November 25, 2014 by Natalie Lehrer

Cloud has matured from a fringe technology into being the preferred delivery model for those who want to deliver IT resources but stay within the bounds of laws such as HIPAA. At the end of 2013, Frost & Sullivan estimated that the cloud services market for healthcare IT stood at $903.1 million.[read more]