Latest Articles from SYS-CON MEDIA
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...
File sync and share. Endpoint protection. Both are massive opportunities for today’s enterprise thanks to their business benefits and widespread user appeal. But one size does not fit all, especially user-adopted consumer technologies. Organizations must apply the right enterprise-read...
So what does real-time mean anyway? An example is, what are referred to as, “hard-real-time systems” [2], where computation must meet stringent timing constraints and one must guarantee that those computations must be completed before specified deadlines. Failure to do so can lead to i...
Simply defined the SDDC promises that you’ll be able to treat “all” of your IT infrastructure as if it’s completely malleable. That there are no restrictions to how you can use and assign everything from border controls to VM size as long as you stay within the technical capabilities o...
No matter how often you deploy your application or how sophisticated your delivery pipeline is, you always need to know the quality status of the software you are building. That can only be done if you measure it; but measure what exactly? In Part 1 we introduced the Concept of Quality...
Today, developers and business units are leading the charge to cloud computing. The primary driver: faster access to computing resources by using the cloud's automated infrastructure provisioning. However, fast access to infrastructure exposes the next friction point: creating, deliver...
Most companies only analyze subsets of their business data and fragmented data in several places – there is nothing “big” about that. By freeing IT time and resources, the process of analyzing your data can be streamlined, ensuring that all the data is in the system, complete, and avai...
In this report Enterprise Management Associates (EMA) analysts explore the ways in which gaining visibility and control over high-privilege access helps organizations achieve regulatory compliance, assure responsible governance, and improve security all while reducing IT operational co...
APIs came about to help companies create and manage their digital ecosystem, enabling them not only to reach more customers through more devices, but also create a large supporting ecosystem of developers and partners. While Facebook, Twitter and Netflix were the early adopters of APIs...
Big Switch Networks and Dell on Thursday announced a strategic agreement that will bring state of the art SDN solutions to an increasingly broad audience. Dell will resell the Big Switch Big Tap application, as well as the Switch Light Operating System, running on Dell's high performan...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
VisionMobile recently published one of the best reports on apps for vehicles that I have read. It is frustrating with how difficult it is to actually get an app approved for use in a car. Here are some of the unique challenges: Safety first considerations (like driver distraction) Lo...
Need to scale your data tier? The foundation of every application is the database layer, and today application architects have more choices than ever. With these choices come new questions: Which database technology is best for your application? How can your application take advantage ...
CodeFutures on Wednesday announced that the U.S. Patent Office has granted it a patent for its Continuous Replication technology that helps database administrators perform maintenance and other processing functions without downtime. U.S. Patent 8,626,709, titled Scalable Relational Dat...
As Eric Reis, pioneer of the lean startup movement notes, a software startup’s ability to succeed depends solely on how quickly and inexpensively they can try new features. The challenge is if you are a typical startup, you are your ops team and development resources are the biggest de...
loud providers Google, AWS and Microsoft are doing some spring-cleaning - out with the old, in with the new - when it comes to pricing services. With the latest cuts, here's a news flash: There's a new business model driving cloud that is every bit as exponential in growth -- with or...
MapDB is an Apache-licensed open source database specifically designed for Java developers. The library uses the standard Java Collections API, making it totally natural for Java developers to use and adopt, while scaling database size from GBs to TBs. MapDB is very fast and supports a...
Clearly, the buzz around wearable technology has to do with the hands-free user design – these smart peripherals allow for a better experience for certain functions. While consumers are not going to do away with their iPhones, tablets and computers anytime soon, wearables make sense as...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
The power of data-driven business networks is increasing, but how do enterprises best leverage that intelligence as they seek new services, products and efficiency? The next BriefingsDirect thought-leader panel discussion focuses on the future of business and how companies can benefit...
NaviSite, Inc., a Time Warner Cable Company, announced on Wednesday a key addition to its suite of cloud storage and data replication solutions with the launch of its NaviCloud® Vault: Data Domain® solution. Enabling a secure, reliable, highly available, off-site replication service th...
Ben Franklin often said that "by failing to prepare, you are preparing to fail." Not preparing for who your actual enterprise mobility management (EMM) customer is may have dire consequences as mobile devices (both personal and corporate-issued) access more corporate data. Before you c...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. Experts Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest collaborate to explore the c...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Launching now on Indiegogo, ALYT (Affordably Link Your Things) is a unique do-it-yourself (DIY), open source, ANDROID powered Smart Home Manager. It enables consumers to easily manage their home security, energy use, entertainment systems, and home automation through their Android or i...
CommVault on Tuesday announced new enhancements to its PartnerAdvantage program designed to help channel partners accelerate revenue growth and simplify collaboration as they expand into new markets, such as data protection, archiving, mobility and cloud services. The expanded program ...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
The market is full of buzz about cloud computing, and with it come sweeping claims about simplicity and savings. Deciding to migrate some or all database management to a cloud hosting provider, however, is a more complex undertaking than conventional wisdom may suggest. This white pa...
The social media expansion has shown just how people are eager to share their experiences with the rest of the world. Cloud technology is the perfect platform to satisfy this need given its great flexibility and readiness. At Cynny, we aim to revolutionize how people share and organize...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuit...
Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Vir...
GIS technology is being used in the healthcare industry today for patient care and preventative medicine among other things. Hospitals and other organizations, with GIS and big data resources now have the ability to collect geographic information from their patients and study trends in...
Just as no year is complete for me without a viewing of Blazing Saddles, no Red Hat Summit is complete without a talk with someone from MongoDB. We therefore posed a few questions for Paul Cross, Vice President of Solutions Architecture at MongoDB, and here's what he had to say. ...
Twitter is fun for me, if for no other reason than I “meet” many wildly interesting people through it. I've developed deep professional relationships through initial contacts on Twitter. But like many of you, I'm sure, I also have numerous Twitter friends whom I've never met, and so...
In the last year, conversations about In-Memory Computing (IMC) have become more and more prevalent in enterprise IT circles, especially with organizations feeling the pressure to process massive quantities of data at the speed that is now being demanded by the Internet. The hype aroun...