* Indicates field is required
How are disruptive technology trends like BYOD and IoT impacting wireless networks? Networking expert Craig Mathias explains in this Q&A.
At Goldman Sachs, a homegrown graph analytics platform has become a tool for compliance and fraud detection. The use case is a good one because risky behavior is also social behavior, according to an expert.
Tom Koulopoulos, co-author of "The Gen Z Effect" spoke to SearchCIO about how Gen Z-ers think about privacy, data ownership and failure, and what CIOs should do about it.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Copy data management can be a backup replacement in certain situations, but organizations need to be aware of its limitations.
Backing up cloud resources is similar to backing up local resources, but standard backup applications aren't always the way to back up cloud data.
Many shops struggle with slow backup and restore times when using traditional backup products. Erasure-coded arrays are no standby for traditional backup, but can help with protecting data.
Bidirectional replication of SQL servers is a business continuity tool for users with multiple remote sites and a central data center.
Here are five ways business continuity activities can identify situations that might prevent your firm from achieving its goals.
Considering DRaaS to support your mission-critical systems? Expert Paul Kirvan shows you the pitfalls to avoid.
The Drobo B1200i rackmount hybrid array gets an update, expanding storage pools to 128 TB and adding thin provisioning for up to 255 volumes.
Consumer peer-to-peer software maker releases Sync 2.0 for secure file sharing between smartphones, desktops and NAS devices.
Connected Data has rolled out two new sync-and-share appliances for businesses that want on-premises secure file sharing.
Learn the benefits of becoming a Hitachi Data Systems reseller partner with our Partner Program Checklist.
Learn the benefits of becoming a Yosemite Technologies reseller partner with our Partner Program Checklist.
Learn about data management software vendor CommVault, Inc.'s partner program in this standardized checklist.