Malicious Tool Provides Attackers with a New Type of Zombies
An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in…
Media & Entertainment Industry Casting Call: High Resolution Digital Assets Offer New Role for Petabyte Storage
Data size is quickly outpacing storage space in the media and entertainment industry, and object-based storage can play a pivotal…
How to Clean Up the Mess: Surviving a Data Breach
Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took…
How to Bolster the Skills of Your In-house IT Team
Over-staffing an IT department is as undesirable as under-staffing – the solution is to right-size to cover normal operations but…
Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers
Hackers continue to target companies throughout the United States with cyber attacks. In 2014, cyber attacks hit a rapid pace…
Obstacles Still Getting in the Way of the Progress of the Internet of Things
Technological advancements seem to happen with astonishing regularity these days, and perhaps no development is more exciting and filled with…
Data Lakes and Network Optimization: What’s Next for Telecommunications and Big Data
Relational data warehouses served communications service providers well in the past, but it’s time to start thinking beyond columns and…
A Look at How Keyless SSL Works
Secure Socket Layer, or SSL for short, is one of the key elements to providing a safe and secure web…
Winning Strategies for Enterprise Mobile App Development
Enterprise mobile apps are being commissioned at a hectic pace across all industries, geographies and business processes.Employees see mobile apps…
XaaS: Today and Tomorrow
You may have heard the terms SaaS (software as a service), infrastructure as a service (IaaS) or PaaS (platform as…