How Idle Servers Cost $30 Billion How Idle Servers Cost $30 Billion By Karen A. Frenkel Wasted Capital The…
Tech Leaders Enlist Analytics to Fight Cyber-Crime Tech Leaders Enlist Analytics to Fight Cyber-Crime By Karen A. Frenkel Way…
How to Approach IT Security Like Homeland Security How to Approach IT Security Like Homeland Security By Karen A.…
How IT Teams Can Protect Health Care Data How IT Teams Can Protect Health Care Data By Karen A.…
Separating Digital Leaders From Digital Laggards Separating Digital Leaders From Digital Laggards By Karen A. Frenkel Few Excel at…
Eight Steps to Securing IP in the IoT Era Eight Steps to Securing IP in the IoT Era By…
Password Cracking Tops IT’s Security Concerns Password Cracking Tops IT’s Security Concerns By Karen A. Frenkel Password Cracking Prevails…
How to Implement a Cloud ‘Privacy by Design’ System How to Implement a Cloud ‘Privacy by Design’ System By…
Databases Are the Weak Point in Big Data Projects Databases Are the Weak Point in Big Data Projects By…
How Empowering Business Users Helps IT How Empowering Business Users Helps IT By Karen A. Frenkel Improving the UX…