Ignore the 5G Hype. Focus on This Instead.

      5G will spark a Cambrian explosion of connected devices that will make our lives easier, better and more efficient in countless ways. Smart homes will become smarter....

    A Smart Investment: CLM in the Cloud

      What could you buy with $20 billion dollars? PC Magazine investigated this question a few years ago and the results were interesting. $20 billion dollars could buy you...

    Our Journey to Devops: How We Transformed Our Infrastructure One Step at a Time

    By Chris Fielding A lot goes into IT infrastructure transformation. We know that firsthand. We've transitioned workloads to the private cloud, adopted...

    Resilience vs Reliability: Are We Measuring the Right Things for Our Electric Power?

    On 9 August 2019 the UK felt the impacts of what was described by National Grid as an "incredibly rare" event. The impacts were immediate: homes were plunged into...

    IT Failure Is Not an Option: Jelly Belly Keeps Rolling Along

    When you manufacture one of America's favorite confections, beloved by a president and a staple in the finest Easter baskets, you know that manufacturing failure is not...

    What your business should do when a hurricane is approaching

      When a hurricane is fast approaching, there’s only so much you can do. Regardless of whether you’ve taken steps to prepare your business for the impending disaster,...

    Container Security Cartoon: What’s in Your Containers?

      If you’re using container technologies, ask yourself this: Do you actually know what’s inside your containers? Do they contain any malicious software libraries? Are...

    The 5 Pillars of Enterprise Resilience

    By James A. Martin It’s all too easy to spot an organization that isn’t fully resilient. Every week, it seems, a company makes headlines for struggling to be...

    A Beginners walkthrough for building and querying AWS Neptune with Gremlin

    by: Greg Cox Amazon Neptune is a fast, reliable, fully managed graph database well-suited for storing and querying highly-connected data. For online applications that...

    Attributes of resilient businesses: What C-suite leaders say businesses need

      Resilience has many definitions. For organizations on the Gulf Coast and Eastern seaboard, it might mean withstanding hurricanes. For others, it’s avoiding ransomware...

    How to prevent phishing attacks: Going beyond education

      At least 3.4 billion fake emails are sent every day as phishing attacks continue to grow and evolve into more sophisticated schemes. Cities, increasingly a target for...

    What’s the impact of a disaster and how are businesses handling them?

      When a cyberattack leaves a company’s data exposed or a flood blocks access to the office or a network outage prevents consumers from making purchases, that’s only...
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.