IT News

How Cloud Platforms Protect Themselves From Security Threats
An estimated 79 percent of companies are already either operating in a cloud environment or preparing to do so, according to CloudPassage’s Cloud Se

Are You Getting the Most Out of Virtualization
Virtualization has been with us since the mainframe days, when a single system could be sliced into separate virtual machines, each allowed to run the

How to Prevent Identity Theft Online
Shopping in the digital realm is not only convenient, it puts the world of retail right at your fingertips. Where else can you buy a new pair of shoes

Review of Lotus Notes
Some have pronounced Lotus Notes/Domino dead, a career killer, a zombie app. Lotus Notes is facing unprecedented user resistance due to perceptions that it is difficult to use and outdated with a tired user interface.

The Reality of Internet Security
Governments have been spying on their citizens since the dawn of time. From McCarthyism to PRISM, the scale of surveillance throughout history has varied according to the resources it took to dig up information on people. Back in the 1950s, it cost tens of thousands of dollars to investigate one person, and it might have taken days, weeks, months, or years to find anything. Now, it costs the NSA just 6.5 cents an hour to spy on you.

How a BYOD Policy Frees Up IT Resources
More and more electronic devices are being integrated into the workforce. Whereas only the most elite business people owned smartphones in the early 2

The History of The Internet of Things
At its annual 2011 developer conference, Google announced it had developed Android@Home. The technology was designed to connect household appliances

Why Application Operations are Needed in the Dynamic Data Center and the Cloud
Massive changes are occurring as to how applications are built, deployed and run, requiring a closer look at application operations. The benefits of

6 Tips to Prepare for Enterprise Mobility
Application portfolio managers and business analysts in an IT environment are being asked to redesign business processes to take advantage of the capa