Yearly Archives: 2021

enterprise security

De-Risking Cloud Consumption: IBM Cloud for Financial Services

0
One of the odder points about cloud computing is the ongoing contentiousness over technical infrastructure. Debating the quality and benefits of various system designs,...

Microsoft Ignite 2021: Cloud, the Metaverse, and More Cross Company Capabilities

0
It is easy to give credit to the pandemic for the radical acceleration of the digital world. While it is true that it ignited...

Cisco Partner Summit: New Enterprise Agreements, Partner Lifecycle Services

0
It’s fall, which in the tech world means the conference season is well underway. One of the major events in networking is Cisco’s Partner...

Cresta’s Zayd Enam on How AI is Changing Call Centers

0
I spoke with Zayd Enam, CEO of Cresta, about the major trends in artificial intelligence – including recent tech advances – that enable this...
enterprise IT

Your Company’s Security: Key Points to Consider

0
The security you implement for your organization can make or break the success of your company. It’s always best to get it right the...

The Public Cloud Market: How Big Will It Get?

0
All three of the leading cloud computing providers are now large – and rapidly growing – businesses. It’s hard to know exactly how large Azure...

Why Smart Cities Begin With More Connected Schools

0
Across the U.S., schools are working through the latest roadblocks to recovery as they try to resume “normal” operations after two years of reinventing...

Will Edge Computing Devour the Cloud?

0
Also see: Top Edge Computing Companies It's a question that the digerati finds itself asking more these days: will edge computing, so rapidly growing, eventually...

Avaya Experience Builders Enables Composable Communications

0
We are living in an experience-focused economy – where digital transformation is growing – users buy outcomes. The days of having a single app...

Solving Your Hardware Security Challenges, Part 2

0
In Part 1 of this article, we explored five key factors that make security assurance of hardware technologies a challenge. This included the disruptive...