From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.
While courts are still arguing back and forth about whether people can be compelled to give up the encryption key for their laptops and other devices, it looks like they may have decided that it’s okay to force you to use your fingerprint to unlock smartphones with that capability.
Judge Steven C…READ MORE
I wanted a big enough cell phone that I would no longer want to carry my 7″ tablet with me in addition to my phone because — let’s face it — a 4″ (diagonal) screen simply isn’t big enough to be comfortable when reading books. But would “big enough” also mean “too big to fit in my front pants poc…READ MORE
IT consultant Dr. Sheryl Kitchen talked about the benefits of AWS and RackSpace cloud services for midsized businesses in our recent conversation. Midsized businesses, those with over $50 million in revenue, should look for cloud providers with proven track records for like-sized enterprises, as wel…READ MORE
Wave 8 has arrived and its massive with 48 new resources – that’s a 50%+ increase
New modules include:
Mark your calendars, Windows Server admins — Ignite is coming.
In a blog post that went live today, Microsoft said the official name of its new conference is Microsoft Ignite. The conference is scheduled to take place May 4-8, 2015 in Chicago, Illinois, and CEO Satya Nadella will be the event’s …READ MORE
We all have habits when it comes to accessing and sharing our data. And some of these habits have scary consequences…which is especially poignant as we wait for little creatures to come asking to get treats or tricks at our door this Halloween night.
We’ve all done it. You fill out an online …READ MORE
Hackers have become highly organized and specialized — so much so that some hacked into the White House’s unclassified computer network earlier this week. Luckily, the administration’s cybersecurity teams were able to mitigate the threat and no serious damage was done.
The attack might have some…READ MORE
Are you prepared for a shift from a business-driven technology strategy to a technology-driven business strategy? It’s happening now, and happening fast. Read what a CIO of a multibillion insurance company believes are the five drivers behind this shift to technology-driven business strategies and w…READ MORE
This week I’ve found some great things for you to read. These are a few of my favorites that I’ve found this week.
The Guard Changes on the Iron Throne
For Half, Degrees In Computing, Math, Or Stats Lead To Other Jobs
IT books that should be on your shelf
Slow q…READ MORE
Passwords, passwords, passwords…that was the main topic in this week’s #ITKESecurity Twitter chat. What did our experts say about them? Here’s a recap of everything they talked about.
Next month HP is expected to reveal a new PC product line up aimed at the commercial market, a little over a month after it split the company in two.
But questions still remain as to whether the move will succeed in getting itself on track with its hardware business and address the gaping holes i…READ MORE
In advance of the OpenStack Summit in Paris next week, flash array vendor Pure Storage is throwing its weight behind the open source cloud operating system.
Pure this week joined the OpenStack Foundation as a corporate sponsor and pledged to heavily participate in development of the OpenStack cod…READ MORE
Apple Pay rolled out to much fanfare earlier this week, but may have bypassed some compliance requirements that Apple’s mobile payment rivals have to maintain. In other recent headlines, the FCC took its first steps toward data security enforcement, Google cracked down on online piracy, and Verizon …READ MORE
An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate’s professional experience, education, and job qualifications and is meant to be read by a computer program instead of by a human…READ MORE
X had just completed 4 years in his role and grown to take on additional business responsibility. He had built a team which worked across business units and corporate IT on the forefront of some of the new technological innovations. Accolades came from peers and industry acknowledging his ability to…READ MORE
Wi-Fi connectivity is a great luxury to have in public places to power your favorite app, but what if your life-saving medical device relied on the wireless LAN to work?
Hospitals are using wireless devices and equipment — ranging from small patient monitoring sensors, to pharmacy inventory syst…READ MORE
If you are engaged in any kind of activities related to mobile wallet, mobile based financial transactions, mobile banking et al, from a point of view of a consumer/ customer, service provider, financial institution or an online merchant, you can’t afford to ignore a globally used and well acclaim…READ MORE
Almost one year ago, Microsoft launched the Microsoft Cloud OS Network with 25 hosting service providers. Today, the number of hosting service providers has quadrupled to more than 100 worldwide with more than 600 local data centers. What that means is expanded opportunity for Microsoft’s cloud serv…READ MORE
On the eve of the release of PCI DSS 3.0, SearchSecurity spoke with Bob Russo, SSC general manager, and Troy Leach, SSC chief technology officer, about the most important changes in the new version of the standard that debuts Nov. 7, 2013. Russo and Leach also offer their perspective on the most imp…READ MORE
I always enjoy going to Agile conferences, big and small, but this year Agile2014 was especially rewarding. I learned so much and got to spend (not nearly enough) time with some old friends while meeting more than a few new ones. I’d like to take the time to thank a few of these new friends for real…READ MORE