What Next-Gen Networking Brings to the Home Table

Okay, so we’re a full year into the first worldwide pandemic in 100 years, and it’s shifted our world completely. Nothing is the same...

Enterprise Security at Home: Remote Access Options

Within the confines of a personal residence, there is normally a modicum of trust involved with those who share rooms together--whether it's a family,...

How to Equip a Next-Gen Home Office

When setting up or upgrading a home office in which you're working for either yourself or for a company, there are a lot of...

Selecting Endpoint Visibility, Management for WFH Employees

Remote work is driving more unstructured data sprawl than ever in the history of digital anything. Whereas before the pandemic (pre-2020), most business data...

Performance Monitoring, Observability for the Home Office

How do users at home or in an office know when they're getting the best performances out of a device, application or cloud service?...

Zoomtopia: AI and Video to Power Healthcare

At the recent Zoomtopia event, the company touted its ability to power digital healthcare. Zoom already integrates with popular electronic health record (EHR) systems, such...

eWEEK eSPEAKS Video Podcast with James Maguire

Episode 32: Semperis’s Mickey Bresman: How to Secure Your Active Directory Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active...

DevOps or ‘DevOops’: Three Tips for Successful DevOps

Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain...

Using Personal Data for Analytics Requires Balancing Accessibility and Security

Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored...

Box’s Mark Wayland on the Importance of the Content Cloud

Remote work existed long before the COVID-19 pandemic. However, now it is part of every organization, and in many cases, permanently. This fundamental change in...

Lenovo Taps Strategic Partners for New Everything-as-a-Service and Edge Solutions

Lenovo has long been one of the tech industry’s canniest vendors in terms of building and extending strategic partnerships. So it is no surprise...

Semperis’s Mickey Bresman: How to Secure Your Active Directory

Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Among the topics we discussed: What does “identity-driven...

Understanding IT Resilience: The Human Component

According to Daniël Pairon at KPMG, “resilience is the ability to deliver critical operations in the face of disruption. It allows organizations to absorb...

Elon is Right, AI is Hard: Five Pitfalls to Avoid in Artificial Intelligence

During the recent Tesla AI Day event, Elon Musk said he discourages “machine learning, because it is really difficult. Unless you have to use...

Veritas’s Simon Jelley: How to Guard Against Ransomware

I spoke with Simon Jelley, GM & VP of Product at Veritas Technologies, about why ransomware is so difficult to defend against, and his...