Evernote’s Three Laws of Data Protection
“It’s all about bucks, kid. The rest is conversation.”–Michael Douglass as Gordon Gekko, Wall Street (1987)Sporting more than 60 million…
What the Sharing Economy Means for Cloud Computing
The sharing movement is in full swing. Innovative “collaborative consumption” companies are helping pool under-utilized assets such homes, boats, cars…
Offsite HIPAA Data Centers Are Key to Health Organization Disaster Recovery
Offsite Data Centers are Key to Healthcare’s Disaster RecoveryCatastrophes can happen at anytime and anywhere. Just ask the staff and…
Big Data: Transforming Information Security [VIDEO]
Eddie Swartz, Chief Security Officer of RSA, the Security Division of EMC, talks about how big data is transforming information…
Business Intelligence’s Benefits Suit All Types of Companies
The need for improved decision-making has fueled the development and adoption of business intelligence solutions for years. This motivation is…
Five More Common Myths About Open Source
We establish some Linux facts and debunk some popular Open Source myths. We establish some Linux facts and debunk some popular Open…
Why Small Businesses Should Switch to Cloud Accounting Software
If you run a small business, you are probably aware of the increasing demand for cloud accounting software. Perhaps a…
Mobile Security Critical for BI
Business intelligence solutions use a company's most important data to chart the business's future course. This centrality to operations means…
CIOs and Big Data [INFOGRAPHIC]
An infographic about how IT departments think of big data. For this infographic, Infochimps interviewed 300 IT personnel of which…
The Power of Business Collaboration Tools [INFOGRAPHIC]
One of the most interesting changes in business over the past few years is the rise of collaboration tools within…