Inside Advanced Scale Challenges|Thursday, July 28, 2016
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Slider: Insight

IoT Urgently Needs to Increase Collaboration

When it comes to the Internet of Things (IoT) there is one thing we can be sure of – the number of online products and consumer goods will increase ...Full Article

Lifting the Fog of Spark Adoption

If you’re stymied by the prospect of deploying Spark for the first time, Craig Lukasic, senior solution architect at Zaloni, offers tips and insights for overcoming some of the ...Full Article

Network Management Automation: The First Step Toward SDN

Unless you live under a rock, if you work in IT, you’ve heard of software defined networking (SDN). The question, however, is are you ready for it? If your ...Full Article

Towards a ‘Composable Infrastructure’

Composable infrastructure is all about making IT truly programmable in order to get the infrastructure that is needed through a single line of code, the author argues.Full Article

The Rise of the Open-Source Platform

The success of closed-source companies (like Microsoft in the early days of the digital revolution) made it easy to write off open source as a niche movement with little real-world ...Full Article

New Safe Harbor Worries Over Data Privacy Could Push Business to Cloud

October 6 was quite an interesting day for consumer privacy. After 15 years in place, the Safe Harbor agreement was declared invalid by Europe’s highest court, the Court of ...Full Article

Could IoT Provide Gun Control?

We’re number 1: At first that's good, a catchy slogan that could form the background of any presidential campaign. Unfortunately, the study by associate professor Adam Lankord at the ...Full Article

When Vendors Don’t Play Nice, the Enterprise Loses

Microsoft is leading the way to the future of the enterprise business model. This might be hard to believe considering the company’s track record of locking users into its ...Full Article

Tools Reveal Enterprises’ Dirty Little Cybersecurity Secrets

By leveraging publicly available information, companies like BitSight and SecurityScorecard rate most businesses' cybersecurity profiles, information third parties like CISOs, CSOs, CIOs, insurers, investors, financiers, employees and, perhaps, cyber ...Full Article

Achieving High Performance Computing without the Supercomputer

When most hear the term "High-Performance Computing" or HPC, what often comes to mind is the image of well-funded research laboratories, think CERN’s Large Hadron Collider, where the sheer ...Full Article
Page 1 of 612345...Last »