Latest


The Data Security Gap Many Companies Overlook


Companies face many risks when it comes to data breaches. Some occur digitally; some occur when a piece of hardware is stolen from the site. But the one we tend to hear...

The Programming Languages That Built Email


Email has changed a lot over the years, and so have the programming languages behind it. Here we take a look at which languages are used for email, and why.

10 Myths About Multi-Cloud Data Management


Multi-cloud data management is the simultaneous use of more than one cloud service by an organization. Learn the facts (and dismiss the fiction) about this type of data...

(Big) Data's Big Future


Data-centric innovation is likely to drive business in a few key ways. Here we take a stab at futurism.

Internet Browsing and Security - Is Online Privacy Just a Myth?


We all want to protect our private information when browsing online, but how possible is it, really? Here we take a look at different types of protection and how they...

Cloud Complication: Simplifying the Cloud with Ben Nye, CEO of Turbonomic


The cloud landscape is changing, and Turbonomic is on the forefront of that change. CEO Ben Nye discusses cloud trends and where he sees it all headed.

Could Your Smartphone Be Hacked?


Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many ways to make your phone less...

The Programming Languages Behind Online File Sharing


Online file sharing has revolutionized the way we share files with one another and collaborate on projects. Here we take a look at some of the languages behind the...

Simply Secure: Changing Password Requirements Easier on Users


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no more periodic password resets!...

Beat Injuries With These 4 Computer Ergonomics Tips


If you've got aching wrists, stiff shoulders or are developing a hunchback, it's time to set up an ergonomic workstation. Here are some tips on how to get it right.

The Control Panel: Why the Best Vendor Cybersecurity Dashboards Are Complex


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at these technologies, and why...

5 Issues That the Mobile Device Industry Needs to Solve, Pronto


The latest in mobile development has brought several smartphone industry life cycle issues to the fore. Here are a few things that the industry needs to solve in a hurry...

Stopping Social Engineering: Who's Looking Over Your Shoulder?


Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about teaching staff how to stay safe.

Serverless Computing: Which Service Is Right for You?


In the world of serverless computing, three providers stand out. Here we compare their features and pricing, to help you decide which is right for you.

6 Big Advances You Can Attribute to Artificial Neural Networks


Artificial neural networks are paving the way for scientific, social and economic breakthroughs. Here's a closer look at some of the advances we can thank ANNs for.

Experts


Why is patch management so important in cybersecurity?


The issue of patch management is something that cybersecurity experts often think about in the context of keeping systems safe. Essentially, patches are used to deal...

Why are companies paying so much for AI professionals?


Recent reports from sources like the New York Times show that leading technology companies are offering new employees hundreds of thousands or even millions of dollars...

How do administrators find bandwidth hogs?


Administrators identify bandwidth hogs through close analysis of a network, looking for IP addresses, devices or applications that may be using more than their...

How might businesses use the AI potential of real-time data systems like SAP HANA?


New cloud-based systems like SAP HANA take advantage of particular hardware and IT architecture setups to utilize the data and also exploit the power of machine learning...

How does a weighted or probabalistic approach help AI to move beyond a purely rules-based or deterministic approach?


Machine learning and artificial intelligence principles are rapidly changing how computing works. One of the key ways that this is happening is with weighted or...