Monthly Archives: March 2019

Top 5 business concerns about public cloud applications

Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report. As companies increasingly move business-critical workloads to the cloud, concerns about security and visibility rise, according to a Monday report from Keysight Technologies and Dimensional Research. Some 84% of the 338 IT professionals surveyed worldwide said their companies [...]

By |2019-03-27T12:52:20+00:00March 27th, 2019|Uncategorized|0 Comments

What you need to know before implementing edge computing

These are the questions your firm should ask before going down the route of edge analytics and processing. Increasing numbers of organizations are gathering and analysing data at the edge of their networks in their quest to improve day-to-day operations. Whether it's for predictive maintenance on lifts and aircraft, or analysing data collected to keep oil rigs running [...]

By |2019-03-25T12:59:11+00:00March 25th, 2019|Uncategorized|0 Comments

Data protection: Top 3 business challenges

More than a quarter of businesses experienced irreparable data loss in the past year, according to a Dell EMC survey. The amount of data enterprises are collecting and managing is exploding, and with that comes problems protecting it, according to a Thursday report from Dell EMC. The average amount of data managed rose from 1.45 [...]

By |2019-03-22T13:10:35+00:00March 22nd, 2019|Uncategorized|0 Comments

Big data adoption exploding, but companies struggle to extract meaningful information

If your organization is having trouble getting value from its data you aren't alone, and big data firm Syncsort thinks it knows what's wrong. While more organizations are prioritizing big data analytics in IT initiatives, many are facing a series of problems connected to the gathering and harvesting of this information, according to a Tuesday [...]

By |2019-03-20T13:09:33+00:00March 20th, 2019|Uncategorized|0 Comments

Top 5 data recovery tips

Losing data can be a scary experience. Tom Merritt offers five helpful tips for creating a data recovery plan. Hard drives die—it happens all the time—but what can you do? You can try to recover that data. Or better yet: Plan ahead so you don't have to fret. Start thinking about the inevitable now—don't wait [...]

By |2019-03-18T12:39:29+00:00March 18th, 2019|Uncategorized|0 Comments

7 tech capabilities your business needs to hit digital transformation success

Data mastery is among the factors vital for companies seeking successful digital transformations, according to a Deloitte report. Organizations are prioritizing investments in digital transformations this year, with budgets for these initiatives increasing by 25%, according to a Deloitte report released on Wednesday. The report surveyed 1,200 US executives to determine their organization's outlook on digital transformation [...]

By |2019-03-15T13:28:07+00:00March 15th, 2019|Uncategorized|0 Comments

How to secure IoT devices: 6 factors to consider

While Internet of Things devices can unlock great insights and value from the data collected, cybersecurity must be built in from the start, according to a report from the Indiana IoT Lab. The Internet of Things (IoT) continues to expand: By the end of 2019, more than 14 billion connected devices will be in use, [...]

By |2019-03-13T13:40:13+00:00March 13th, 2019|Uncategorized|0 Comments

How tech companies can recruit and retain more women

Learn about the benefits of creating a more diverse workforce and promoting women to leadership roles, reasons why women leave tech jobs, and tips on recruiting and retaining women at tech firms. The first computer programmer was Ada Lovelace; Margaret Hamilton coined the term "software engineering" and helped develop the on-board flight software for NASA's Apollo missions, Grace Hopper was [...]

By |2019-03-11T14:38:39+00:00March 11th, 2019|Uncategorized|0 Comments

3 things you need in a cybersecurity awareness training plan

Organizations can change employee security behaviors by creating a strategic plan, according to SANS Security Awareness. When it comes to an organization's employees, the security community has a common refrain: "People are the weakest link." However, we need to reframe that thinking: People are the primary attack vector, and only become the weakest link when [...]

By |2019-03-06T13:33:08+00:00March 6th, 2019|Uncategorized|0 Comments