Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.
Stories by Bob Violino
Hyperconvergence is appealing for more workloads now that systems can independently scale compute and storage capacity via a disaggregated model. The ability to create a hyperconverged solution using NVMe over fabrics is another draw.
Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure.
Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.
Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.
As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.
Without network support, businesses may not be able to reap all the benefits of the data IoT generates.
Enterprise mobility management tools are evolving far past their mobile device management roots. New features include better analytics, integration with Office 365, mobile identity management -- and preparing for the internet of things.
Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased.
Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.
Bland by name and superficially viewed as gee-whiz technology never to be realized, the Internet of things (IoT) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.