Related Content
What's Going On with Data Security? It seems like every day we are hearing about more security breaches. Whether it is Target's losing credit card information of more than 110 million Americans or Yahoo’s data breach, in which the company lost user passwords and usernames, one has to wonder what is going on with data security. |
||
Can OpenStack Get Operations Right? According to many industry pundits—including Forrester—OpenStack is well on its way to becoming a standard, but the platform is still struggling with developing the proper tools to operationalize it. Beth Cohen examines whether or not OpenStack can get operations right. |
||
The Dangers of Circumventing IT to Access the Cloud Being able to directly connect to the cloud for software solutions allows professionals in every department to take information systems out of the equation in many technology decisions. But these "shadow IT" projects can leave them open to security breaches, especially on mobile devices. Read on. |
||
Is It Time for Cloud Providers to Control Malware Distribution? A recent Quarterly Threat Intelligence Report by Solutionary has revealed some alarming numbers about malware distributors and their hosting providers. Rajini Padmanaban looks at whether hosting providers are proactively rooting out malware or if they may actually be a part of the problem. |
||
Is "Erasable Internet" a Viable Future for the Internet? Snapchat's emergence creates an important separation in the Internet space—an Internet where the data stays forever and an Internet where the data is temporary—referred to as Erasable Internet. Are we headed toward an ephemeral Internet or continuing with one that is permanent? |
||
No Hard Drive Required: Cloud Connect Takes Unique Approach to DaaS Several software vendors have come forward with solutions for the growing desktop as a service (DaaS) trend. The Dell Wyse Cloud Connect could change the game by making personal desktops in the cloud available—and affordable—for the average consumer. Does the future of tech mean no more hard drives? |
||
Software Defined Networking vs. Network Function Virtualization Two networking abstraction paradigms (SDN and NFV) are emerging to address the need for better tools that provide the greater flexibility and more rigorous control needed to manage the thousands of separate virtual networks used in a public cloud. |
||
Take Charge of Your Online Identity Online networking is easier than ever, but this strength can be a threat if one’s online identity is not managed well. Organizations do their part to protect their users’ identities and privacy, but it is high time the user steps up to be his own tester in validating that he safeguards himself. |