By: Laura Stotler Securing the cloud must become a standard operating practice if companies hope to successfully deploy cloud strategies without opening themselves up to major threats and breaches. A new report from The Cloud Security Alliance (CSA) finds that one of the …
By: Peter Scott Entitlement management is not usually the first thing on the mind of application producers and intelligent device manufacturers. But it should be.
By: Christopher Mohr According to a recent study commissioned by Red Hat, the perception on what drives decision-making when it comes to mobile application development is changing. Although a plurality of respondents feel that IT drives such decisions currently, they feel this …
By: Susan J. Campbell Do you ever worry about your local retailer? Not that long ago, we saw the demise of the Mom and Pop establishments as the Big Box stores moved in and put them out of business. Now, the bigger giants are …