What does a next-gen cellular network look like? Meet Scratch Wireless, a Massachusetts startup looking to disrupt the mobile space by providing 'Wi-Fi First' smartphones that rely primarily on hotspots.
Today's entrepreneurs have more ways than ever to fund their business concepts. They just have to know what they need -- and what they are willing to give up -- to get it.
Mastering the art of asking questions is the hallmark of disruptive leaders; plus, read how CFOs are capitalizing on big data. The Data Mill reports.
The Open-IX data center certification aims at resiliency through self-declared certification and an annual renewal process, rather than proprietary oversight.
Old ways of securing physical networks are giving way to logical techniques. The change in traffic to an East-West, data-center-centric, software-defined-network model necessitates a new security plan.
Enterprise IT shops have new choices: Converged systems simplify management and scaling, while commercial off-the-shelf servers tailor resources without vendor lock-in.
In an ever more dangerous world, your trusty VPN has a more important role than ever.
SN blogs: This week, analysts discuss how white-box switching will become more affordable, and why multinode server platforms aren’t much different from blade servers.
Extreme Networks is expanding on its software-defined architecture with the addition of new products, partners and enhancements to existing technology.
With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates.
The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses.
Video: Learn how to use KeePass, the free password-management tool that can offer cash-strapped enterprises a way to help employees encrypt and secure their work-related passwords.
Software testers trying to identify performance problems in Java apps might be using the wrong requirements and tools. Two experts suggest ways to accurately pinpoint problems.
A recent survey shows software professionals have a basic understanding of application security concepts, but they lack the knowledge to fix the resulting security issues.
Learn some cloud application testing techniques to ensure data security.
Archiving data in place is becoming more attractive to enterprises because it allows data to be archived on the storage it already resides on.
Seagate beefs up ClusterStor storage systems acquired from Xyratex, with new Hadoop optimization tools, Lustre update and secure data appliances.
Analyst Jon Toigo explains why performing analytics on big data sets means that data is no longer considered cold, reducing the importance of archives.