Is it time to bring text analytics in-house? A director of analytics at Visa advises CIOs to consider these three questions before making a move.
An introduction to Tamr; JSON as the next SQL; and why agile doesn't always work: The Data Mill reports.
Is there a 'd-i' missing from the middle of the IoT acronym? Read on for IT and business strategist Harvey Koeppel's humorous take on the meaning and disruptive nature of the Internet of Things and the 10 things CIOs can do to prepare for the IoT.
Choose the right data center provider or facility now, and prevent costly errors and inadequate services later.
What goes into your data center chiller might be warmer than expected, as energy use reduction efforts threaten the capacity of CRAHs and other cooling systems.
I have one-acre of real estate located near multiple data centers that cater to the financial community. Can the property, with a 35,000 square foot building, host a data center?
Meru Networks wins this month's Network Innovation Award for its work in developing the first OpenFlow-certified application in the wireless market.
VSS Monitoring offers a low-price network packet broker to network monitoring operations in mainstream, midrange enterprises.
SN blogs: This week, one analyst discusses the importance of incident detection and response; another speculates on the benefits of SDN and DevOps.
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.
The IBM patches address several Java vulnerabilities, some of which were rated as severe, in the company's Notes and Domino platforms.
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively.
See what distinguishes Alpha Anywhere, a platform that allows developers to quickly create prototypes of potential new applications.
Our business is relying more and more on smart process applications to manage business-critical processes. This means application security is even more important than ever. What's your advice on ensuring not only that the code is secure, but that business logic is also secure? I want to ensure that the functionality as designed isn't exploitable.
SwiftStack CEO Joe Arnold delves into new Series B funding, competition, customer trends and the firm's future direction.
If predictable performance is a concern, IT planners should look for a solution that can set up a dedicated storage tier and a converged storage tier.
Converged infrastructures bundle compute, storage and networking into a single offering that can be deployed quickly. Find out what else they can do.