Sign up | Login with →

IT

Taming Big Data

April 25, 2015 by Martyn Jones

Taming big data.

Simply stated, the best application of Big Data is in systems and methods that will significantly reduce the data footprint. Why would we want to reduce the data footprint? Years of knowledge and experience in information management strongly suggests that more data does not necessarily lead to better data.[read more]

How Each Game of Thrones House Would Approach Corporate IT [INFOGRAPHIC]

April 23, 2015 by Matthew Zajechowski
1

IT Game of Thrones.

Are you a Game of Thrones fan? If so, you understand the all-encompassing fandom and how absolutely everything can be related to Game of Thrones. We feel the same way- and that’s why Adeptia decided to imagine how each Game of Thrones house would approach corporate IT.[read more]

exclusive

A Better Way to Model Data

April 21, 2015 by Mark Hargraves

Data modeling.

Over 8 years ago, the Spider Schema Data Model was created to provide an easier way to model OLTP data into a supported OLAP data model with the advantages of the OLTP data model. Over the last 8 years this data model has been proven out and is: faster at data processing, uses less storage space, is more flexible, and provides full support for not only OLAP, but OLTP, and Big Data.[read more]

IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform

April 18, 2015 by Sarah Smith

IBM.

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders. On Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. Other organizations can use the platform to share or confirm their own data, so they can more efficiently respond to security incidents.[read more]

exclusive

Malicious Tool Provides Attackers with a New Type of Zombies

April 15, 2015 by Sophie Davidson

Cyber criminals.

An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in the scope of cyber criminals and internet security specialists. The IoT is a vision, rather than an actual network. It's the notion that with increasingly more devices empowered by communication facilities, those devices inevitably end up as entities in a network scheme.[read more]

exclusive

Media & Entertainment Industry Casting Call: High Resolution Digital Assets Offer New Role for Petabyte Storage

April 14, 2015 by Russ Kennedy

Petabyte.

Data size is quickly outpacing storage space in the media and entertainment industry, and object-based storage can play a pivotal supporting role to help companies meet growing challenges[read more]

exclusive

How to Clean Up the Mess: Surviving a Data Breach

April 14, 2015 by Neill Feather

Data breach.

Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took weeks to discover. For many businesses, these data breaches were catastrophic to the point of bankruptcy (the average cost of a single compromised record being more than $194).[read more]

How to Bolster the Skills of Your In-house IT Team

April 13, 2015 by Simon Mitchell

IT team.

Over-staffing an IT department is as undesirable as under-staffing – the solution is to right-size to cover normal operations but also use a good Managed Service Provider. The IT world is changing. Organisations are increasingly threatened with hacking and viruses such as Heartbleed. A wider-than-ever skillset is needed. Can your internal IT team cover all bases?[read more]

Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers

April 9, 2015 by Sarah Smith

Cyber security.

These days, cyber attacks are the biggest threat to companies and governments around the world. Even President Obama recently laid out a comprehensive plan to tackle cyber security issues. It remains to be seen what results Facebook's ThreatExchange can produce. Still, any platform that brings cyber security experts together and encourages them to share data is a positive development. Hackers are only going to step up their efforts, and security experts need to respond with a concerted effort.[read more]

exclusive

Obstacles Still Getting in the Way of the Progress of the Internet of Things

April 4, 2015 by Rick Delgado

Internet of things.

Technological advancements seem to happen with astonishing regularity these days, and perhaps no development is more exciting and filled with more potential than the Internet of Things (IoT). The IoT could possibly changes our lives, keeping everybody more in touch with others and the objects around us. Businesses could be run more efficiently.[read more]

exclusive

Data Lakes and Network Optimization: What’s Next for Telecommunications and Big Data

March 31, 2015 by Sameer Nori

Telecommunication. 

Relational data warehouses served communications service providers well in the past, but it’s time to start thinking beyond columns and rows. Unstructured data will be the fuel that powers risk management and decision-making in the near future. And to use all sorts of data to its fullest potential, we need new ways of storing, accessing and analyzing that data.[read more]

exclusive

A Look at How Keyless SSL Works

March 28, 2015 by Anand Srinivasan

Secure socket layer.

Secure Socket Layer, or SSL for short, is one of the key elements to providing a safe and secure web transaction. Websites that offer financial services or handle confidential user information have for long used SSL technology to encrypt such sensitive data and thus deter hackers from stealing them.[read more]

exclusive

Winning Strategies for Enterprise Mobile App Development

March 24, 2015 by Glenn Johnson

Mobile apps.

Enterprise mobile apps are being commissioned at a hectic pace across all industries, geographies and business processes. Employees see mobile apps as an essential means of resolving issues raised in phone calls, emails and other messages delivered by smartphones and tablets usually while the employee is ‘off site’ and ‘off duty.’[read more]

exclusive

XaaS: Today and Tomorrow

March 22, 2015 by Beata Green

Everything as a service.

You may have heard the terms SaaS (software as a service), infrastructure as a service (IaaS) or PaaS (platform as a service). However, what about XaaS? This acronym stands for “anything as a service.” Simply put, XaaS stands for software, infrastructure and platform as a service when they are all delivered in a single package. When put together, these three services replace those that traditionally were provided by one or more IT departments or companies.[read more]

exclusive

5 Non-Standard Ways to Use Cloud Storage

March 21, 2015 by Terry Smith

Cloud storage.

We all get used that cloud storages like Dropbox and Google Drive serve one definite purpose: to keep our data online. Thus, we can easily add, remove, share access, open, or edit files and rest assured that the storage would backup and synchronize all our changes. This is a standard way to utilize a service like this. However, more advanced users are constantly finding new ways to benefit from certain cloud storage options. Have a look at five most non-standard tricks you can do with your Dropbox or Google Drive.[read more]