News and Views

How Linux took over the world

How Linux took over the world

0
The computing world is never a dull place, and sometimes the most innocuous-seeming things turn into monsters. Consider, for example, the Linux operating system. Twenty-five...
FIDO progress on passwords

FIDO progress on passwords

1
Since the early iterations of user names and passwords, the road to creating a simple but secure online experience has been a long and...
VMworld 2016 – the 4 cloud ‘Rs’

VMworld 2016 – the 4 cloud ‘Rs’

0
“Nonsense” is Pat Gelsinger’s response to the hype around digital business, which calls on enterprises to place sole focus on a new style of...
Year of the bots

Year of the bots

0
When most of us hear the term ‘bot’, we think of the infamous botnets that bombard us with malware-laden spam or deliver automated denial...
Data centre options in a post-Brexit world

Data centre options in a post-Brexit world

0
In a recent conversation with a senior executive at a rapidly expanding, Toronto-based cloud provider, an inevitable point of discussion was European expansion. Like...
Analytics may boost network security

Analytics may boost network security

0
Security is top of mind for most of us. Everyone, it appears, is out to do evil, and to make a profit from it....
IT-in-the-service of business: a cost equation

IT-in-the-service of business: a cost equation

0
The IT leader today wears a heavy crown. Supporting a vocal end user community that has consumer aspirations for instant-on IT, he/she is also...
The Open Compute Project; open is one thing, interoperable is another

451 Research: The Open Compute Project; open is one thing, interoperable is another

0
In IT parlance, “open” is often used synonymously with interoperable, but is that really end of story? In this special report presented below, 451...
Microsecond speed in new financial fabric

Microsecond speed in new financial fabric

0
Imagine a global fabric that connects all financial and capital markets, linking buyers and sellers to each other through one large, secure networking pipe....
Do you have what it takes for Agile?

Do you have what it takes for Agile?

0
Enterprises may be on board with the idea of Agile methodologies, but do they actually have the skill sets in hand to achieve it? David...
Conyainers FTW

Containers FTW

0
The cloud was built on virtualization. It allows maximum use of hardware in a cost-effective way, and helps providers support customers while protecting them...
Nowhere to hide: Nuix Voice speeds audio and video analytics

Nowhere to hide: Nuix Voice speeds audio and video analytics

0
Nuix, an information protection and security intelligence provider, has announced its partnership with voice analytics vendor Voci Technologies. Under the terms of the agreement, the...
Cloud Computing

Vitamin Y: a Dell cloud – IoT update

0
Context:  Dell’s acquisition of EMC has cast a long shadow. Since announcement last October of this major milestone in the company’s decade long quest...
Cloud Lock

Interac tokens transit to IBM cloud

0
There’s a first time for everything, as they say. That’s certainly the case for Interac as it breaks from tradition to bring its latest...
Vitamin Y: VMware’s “transition year”

Vitamin Y: VMware’s “transition year”

0
Context: Pat Gelsinger was in town this month on what is emerging as a regular bi-annual tour to talk with major Canadian customers. While...