Open Source projects and tools now exist across nearly all industries and functional areas of computing. They are largely supported ...
  Intel has announced the acquisition of PasswordBox, a Montreal-based provider of a cross-platform identity management service. Prima...
By Dan Virgillito   Establishing a penetration testing methodology is becoming increasingly important when considering data security ...
  The drive behind implementing DevOps has continually shifted from an initial desire to unite disparate cultures within a company to ...
  As a CIO you specialize in utilizing technology to support efficiency and growth within your organization. Your IT leadership a...
  IBM and Twitter recently announced a data analytics partnership which enables IBM to incorporate Twitter's data into its products fo...
  Recently I've seen a couple of blog posts dealing with the job interview. In this economy IT workers need all the help they can get ...
  The latest version of the open source platform OpenStack is now available. The latest version, Juno, addresses more than 3,000 bug f...
  Cyber attacks, maleware, phising, Denial of Service Attacks - where do enterprise security threats end? The short answer is it never...
  By Dan Virgillito With the number of employees telecommuting, traveling often or working remotely on the rise, the conventional co...



White Papers