BYOD, BYOT, BYOC, All One Facet of a Bigger Challenge
IT has no shortage of four-letter words. It’s not clear what the latest variations on the “BYO” or “bring your own” theme add.
DetailsIT has no shortage of four-letter words. It’s not clear what the latest variations on the “BYO” or “bring your own” theme add.
DetailsThere are hacks and there are business continuity hacks. Some hacks are bad news, especially when they target IT security and jeopardize business continuity, but others – the other kind of hack – could save the day in certain circumstances.
DetailsDon’t take this title too literally. Ransomware, the malware that extorts money from victims to prevent a disaster, will surely continue to be active, at least in the short term.
DetailsMachine learning, if you have not already met it, is the capability of a machine (a software application) to modify its rules and algorithms according to new data.
DetailsDo the formalism of IT service management and the agility of DevOps mean that one can only succeed if the other fails?
DetailsA well-known IT security solution vendor recently published a white paper about planning for business continuity, and listed typewriters as examples of equipment that should be safeguarded to prevent interruptions to an enterprise’s activities.
Details