For mobility expert and entrepreneur Bryan Barringer, sitting on a wallet all day is a real pain in the backside. The mobile wallet represents a new and improved way to pay.
Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.
In this video interview, 2015 MIT Sloan CIO Leadership Award winner Michael Nilles discusses why a company-wide effort is needed for enterprises seeking successful digital transformation.
I deleted a partition on my Linux system, but I still see a boot menu. How do I re-install GRUB2 and not lose data?
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
Virtualization, rapid refreshes and shadow IT make it harder for IT departments to really know -- and properly license and support -- what they have. You need an IT asset management system to show you.
Harvesting your networking data to generate business intelligence can be done -- if you know how to begin.
Cisco plans to acquire OpenDNS and use its security-as-a-service products to reduce the number of IoT threats customers face.
Industry analysts discuss steps to protect WLANs against honeypot APs and how Juniper's alliance with Ruckus could shake up the market.
Controversial Italian surveillance software firm Hacking Team was attacked, resulting in a 400GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.
A HIPAA audit covers privacy compliance, and organizations need to be prepared. Expert Mike Chapple discusses privacy in the audits.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.
Gerie Owen provides an overview of ALM methodology, covering its requirements, development and maintenance phases and its core components.
Expert Matthew David goes over key factors to consider when buying mobile application development tools, like security, testing and hosting.
When it comes to choosing between Agile or Waterfall projects, Agile proves more valuable for helping development teams and stakeholders retain focus on the right software requirements.
Software-defined storage among innovations that can ease long-term data retention with reliable access to data as hardware changes over time.
Software-defined storage has promise, but hypervisor and SDS vendors are making some of the same mistakes as their storage ancestors.
ITA Group cites primary data reduction capabilities as a key factor in picking Tegile arrays after it outgrew its EMC VNX system.