The ongoing shift to the cloud is affecting nearly all types of IT environments—including Microsoft platforms and applications.
Stories by Bob Violino
These 10 SaaS providers offer leading business management, productivity, software development, and collaboration tools from the cloud.
How four companies improved storage, backup, telephony, security, scalability, IT efficiency, and the bottom line by moving to the cloud
Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered.
Serverless computing is designed to automate infrastructure provisioning and eliminate the burden of server management.
Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.
Hyperconvergence is appealing for more workloads now that systems can independently scale compute and storage capacity via a disaggregated model. The ability to create a hyperconverged solution using NVMe over fabrics is another draw.
Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure.
Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.
Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.
If you think the proliferation of mobile devices changed the concept of the network edge, get ready for the emerging Internet of Things (IoT), where a network-connected sensor could be located on top of a mountain, in a corn field or even in the ocean.
From data concerns to staffing needs to technology combinations, data analytics misconceptions abound. Here’s a no-bull look at how to leverage data science to deliver bona fide business results.
Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.
The era of installing software from a CD or from a datacenter’s server is coming to a close, as internet-delivered software makes applications available anywhere, anytime
The servers, operating systems, core software, and networking you’ve long deployed in your datacenter is moving outside your walls to the public cloud