Tags #Control

Tag: #Control

Medium voltage AC: Big Data? ‘Big Power’ isn’t far behind

Context: an evolving standard for power distribution Data center operators are under intense pressure to maximize the efficiency of data centers. To maintain competitiveness in...

451 Research: View Technologies launches real-time, location-based RFID service for IoT...

A convention has built around the Internet of Things which measures IoT market potential in terms of the number of devices that will be...

Connecting the dots: security integration at Dell

Visions of the ‘wild west’ are often conjured in reporting on the business use of IT today, and the biggest outlaw is typically BYOD....

“Your company’s biggest risk is everyone in it”

“Are you making it too easy?” was the fundamental question posed at the Toronto launch of a countrywide Dell Security Tour that has taken...

Encryption key to cloud security

In the article below, Kevin Fogarty picks up cloud where he left it – with colourful discussion of security challenges that starts with the...

Innovate and integrate to connect security

‘An ounce of prevention is worth a pound of cure’ applies to more than stocking up on your vitamins. It is also a sound...

Here we go again

Innovation can be a wonderful thing. The trouble is, it's a two-edged sword that can be used for good or ill. And when there's...

Risks of public cloud multiply even as enterprise use surges

A few years back, raising the issue of data privacy was viewed in many IT discussions as a traitorous act. Dazzled by the economic...

Cloud relationships rule at Dell World 2014

Dell had a lot to crow about at its fourth annual user conference in Austin, Texas this week. In his opening keynote address at...

Dell trains eyes on security software

In building its Software Group, Dell has been careful to observe two key management maxims: the importance of integrating new capabilities to leverage the...

Vitamin Y: The value of (business) collaboration

Context: At InsightaaS, we write extensively about "collaboration" — and like many professionals with an IT bent, we often interpret the term itself as referring...

451 Research: 451 Security Summit – Securing the data supply chain,...

InsightaaS perspective: 451 Research is one of the world’s leading sources of insight into cutting edge technologies — including areas that are important to...

Building cloud security from the end up

In the spring of 2009, Gartner identified data security as one of the top five inhibitors to broader adoption of cloud computing. Research commissioned...

Heartbleed should be making you sweat

It’s been a couple of months since news of the Heartbleed vulnerability first spawned global near-hysteria. The bug, which sat virtually unnoticed on approximately...

CASL and e-communications in Canada: in pursuit of the Dark Ages

Context: For many of us, the 1990s don’t seem like a very long time ago — but from a work mode perspective, they are almost...

Research and Resources