Tech Primers

How-tos, tech analysis and explanation

ddos attack wi fi defense
bacon mobius

Use software license optimization tools to get your money’s worth out of SaaS

Many organizations fail to adequately monitor SaaS product use, resulting in over-licensed situations

banana slip

Where SDN falls down

SDN focuses on connectivity challenges at layers 2 through 4 and largely ignores application-centric challenges at layers 4 to 7

Is it safe to use public Wi-Fi networks?

As long as you take a few common sense precautions.

Detecting advanced threats with user behavior analytics

Using big data and machine learning to assess the risk, in near-real time, of user activity

iPaaS: A new approach to cloud Integration

Comparing "Integration Platform As a Service" to legacy approaches to cloud and data integration, such as traditional ESB systems

How financial service firms use big data to meet business goals

The pressing challenge is to drive more continuous value and unearth opportunities more rapidly.

Could Facebook be your next phone company?

Yes, thanks to WebRTC. This open-source project aims to transform the humble Web browser into a full-featured unified communications portal

Conventional IT security is failing: Continuous monitoring and mitigation can help

The question is no longer if or when you will experience a significant security incident, but how well your processes and controls address detection, analysis and response. Without a real-time, independent and comprehensive view of...

Consumer Identity Management systems step up where traditional ID systems fall down

CIDM has emerged to address the broader scale and risk of Web-based business processes and to give customers more control of their data

raspberry pi 2 model b v1.1 top

10 Reasons why the Raspberry Pi 2 Model B is a killer product

The Raspberry Pi 2 Model B was recently released and it’s quite a step up from its predecessors. Here's ten reasons why it's a killer upgrade ...

sip

5 keys to successful SIP implementation

SIP can cut costs and increase network flexibility and the efficiency of existing resources, but consider these issues to ensure successful implementation

fingerprint 620x465

Browser fingerprints, and why they are so hard to erase

Fingerprinting is an increasingly common yet rarely discussed technique of identifying individual Web users

hybrid cloud

Key questions to consider when evaluating hybrid cloud

Hybrid cloud is the talk of IT, but to avoid costly, labor-intensive megaprojects you cannot escape, pay particular attention to minimizing implementation and management complexity.

Debunking the myths about scale-up architectures

Given the rapid pace of server design innovation, earlier concerns about scale-up servers no longer hold water

network switches ethernet cables

Zero Touch Provisioning can help the network world catch up to server advances

Rather than using CLI to configure systems one at a time, ZTP can roll out new switches with a click of a mouse

cyber threat

How to stay ahead of threats to DNS servers

It’s virtually impossible to stop DNS attacks, but these best practices can significantly minimize the impact

How to transition from customer understanding to customer action

It requires an architecture different from traditional data warehousing and business intelligence applications

PCI DSS 3.0 went into effect Jan. 1. Are you in compliance?

There are many changes, and some companies may not realize they are now out of sync

Load More