Blog entries by Jeff Slapp
June 17, 2019
5G and edge computing are very much symbiotic technologies, whose mutually beneficial relationship will support a wide variety of exciting new IoT-based applications and other emerging technologies for businesses and consumers alike.
April 04, 2019
The most common cloud-specific security concerns include data breaches, hijacked accounts, malware and distributed denial-of-service (DDoS) attacks. For this reason, some organizations have built hybrid cloud solutions or completely removed their data from the cloud. This enables them to assume total control over security, reducing risks and making it much more difficult for those with malicious agendas to access sensitive content.
March 07, 2019
That brings us to a major trend we’re seeing in enterprise IT today. With most IT departments stretched thin, outsourcing back-end functions and complex technologies has become necessary in order for them to focus their in-house technology experts on projects that boost profitability, customer service and innovation.
January 30, 2019
There are four key pillars in a sound data protection strategy. Each of the pillars plays an integral part in ensuring the best possible integrity and recoverability of mission critical data.