Friday, April 19, 2024
- Advertisement -spot_img

CATEGORY

Blogs

Blog | Is flash all that? Why hybrid arrays rule the flash domain

Through this combination of technologies, organizations have the best of both worlds with hybrid flash storage arrays. To take advantage of flash performance and make the most out of an IT budget, the hybrid approach makes the most practical sense.

Blog | Mobile money agents help bring financial services to the unbanked

A staggering 75 percent of consumers residing in developing countries live their lives without formal financial services. Many are unable to enjoy the financial security and convenience experienced by their ?banked? counterparts.

Blog | Cloud boom empowers business, creates new career opportunities

Cloud computing is empowering enterprises by providing IT infrastructure, software, and services through an Internet-based delivery model on a pay-as-you-go basis. Instead of maintaining their own equipment and IT assets, companies can concentrate on creating business value for their customers.

Blog | Why security is failing in organizations today

Organizations today face advanced and complex security threats ? including nation-state attacks and well-funded cybercriminals. The threat landscape continues to evolve on a daily basis, as malware authors and cybercriminals progress in the complexity and depth of attacks they push out.

Suarez | Politi-ko.com and the 2016 PH elections

The website Politi-ko.com is his own little way to help change the culture of personalistic Philippine politics where candidates are elected more for their popularity than their competence or stances on vital issues.

Blog | Are Asean CFOs starting to embrace the Cloud?

Cloud is available in a variety of models including public, private, and hybrid Clouds to meet business requirements. In particular, the adoption of ERP applications running in public Clouds has increased significantly as public Cloud enables organizations to consolidate disparate systems onto a single platform.

Blog | The dawning virtual age

The arrival of graphics processing for personal computers 30 years ago banished monochrome and grayscale displays and triggered a revolution in computer-graphics-enabled applications, gaming and entertainment.

Suarez | Danish pump manufacturer picks PH as global IT hub

It?s the formal opening of the Grundfos IT Center which will support internal IT operations of offices worldwide of the Danish pump manufacturer. This means offices in 55 countries and around 19,500 employees.

Parcia | Hacking and corporate culture: What?s the connection?

Inside information, epitomized by the ?password?, is still the most vulnerable point of failure. Security auditors will tell you that companies with the stature of Sony might have sophisticated technical deterrents deployed but might also have personnel that didn't pay much attention to basic privileged access management schemes or were just plain careless.

Blog | Unified Threat Management versus Next-Generation Firewall

Essentially, both terms refer to a single device with multiple and consolidated functionalities, causing confusion among customers and vendors. Both UTM and NGFW are very similar with some minor differences.

Latest news

- Advertisement -spot_img