Related Content
Enterprise OpenStack Deployments—Why Hide? With more than 4,700 attendees, double the number at the Hong Kong Summit a mere six months ago, the May 2014 OpenStack Summit in Atlanta was by all measures a resounding success. So why are so many enterprises reluctant to go on record about their OpenStack implementations? |
||
Major US Retailers Set Up Cyber Intelligence Sharing Center In hopes of minimizing the risk and financial fallout from another disastrous cyber attack, some of the top retailers along with the Retail Industry Leaders Association have announced they are launching a clearinghouse: the Retail Cyber Intelligence Sharing Center (R-CISC). |
||
Cloud Orchestration—Are We Finally Singing the Same Tune? Are you holding back on moving applications to the cloud because of a diverse portfolio of installed systems? Beth Cohen examines whether cloud orchestration tools can be used to improve the management of IT application portfolios as they migrate on to public, private, and hybrid cloud platforms. |
||
Should You Consider a Private Cloud? The days of traditional data centers are numbered, but it's important to know that there are more options out there than just throwing all your information up on the cloud using Google Drive. If you haven't already looked into using a private cloud platform, today might be the day to do so. |
||
Big Data Makes Big Impact on Retailer Location Freedom from the commitment of a lease or rental agreement gives virtual stores the advantage of flexibility with future decisions while using big data to maximize their revenue streams. Now, big data can help level the playing field when it comes to the perceived disadvantage of rental space. |
||
Data Leaks—Will Secure Programming Save the Day? 2014 is already shaping up to be another horrible year for compromised data. With all the widely publicized large-scale data leaks, there has to be a better way to secure sensitive data and applications. Secure programming, combined with more sophisticated network separation, might be the answer. |
||
Killing Mobile: The Advent of the "Kill Switch" Last week, many of the major phone manufacturers and wireless companies announced they would offer an antitheft feature on smartphones. The feature, known as a kill switch, will include several components aimed at deterring theft. |
||
Just How Persistent Are Your Cloud Bits, Anyway? Have you ever wondered what happens to your data if you cancel services with your cloud service provider? Is the data really gone, or does it persist? Beth Cohen looks at the common data backup and disposal practices and how various backup practices can affect the outcome. |