Expert Advice

EXPERT ADVICE

Encryption vs. Tokenization: Under the Hood

The encryption vs. tokenization battle sometimes seems as fierce as the war between Pepsi and Coke, or the Cubs versus the White Sox. A lot has been written recently about securing data in the cloud, and the merits of the two methodologies are constantly being debated. The good news is that an arg...

EXPERT ADVICE

10 MS Exchange Practices Most Companies Should Shun

Deploying, managing and maintaining the high availability of the Microsoft Exchange 2010 email platform in enterprise environments is no small feat. Given the increased complexity of this new Microsoft platform, there are numerous key decisions to be made as the precursor to keeping Exchange running...

EXPERT ADVICE

Smoking Out Attackers Hiding in Encrypted Data

Most enterprises have a number of network security appliances that provide protection against attacks aimed at enterprise computing resources, as well as prevent the loss of sensitive enterprise data due to leakage. They work by matching network traffic with threat signatures or tracking application...

EXPERT ADVICE

Burning Rubber on the Internet Superhighway

Online commerce is in its prime. Never before has a similar priority been placed on Web presence by organizations in every industry. Even brick-and-mortar companies are scrambling to put their best foot forward in the online world and not be eclipsed by their more technology-savvy competitors. E-...

For a growing number of businesses, maintaining fail-safe website availability is a matter of business-critical importance, and not just for the e-commerce industry. Certainly for the e-tail trade, website downtime equates to lost business, but beyond the online sales realm, Web availability is para...

Like any other winner-take-all industry, the digital music world is not immune to trendy tech solutions that come and go. Hybrid apps, however, are one trend that's here to stay. Software developers in almost every industry have been meeting their customers' needs for years with early versions of ...

EXPERT ADVICE

The Fast Track From Code to Cloud

Over the past decade, software development has undergone several transformations that have led to the new practices and methodologies such as agile development. Combining emerging technologies -- including dynamic language platforms, cloud computing, and agile development practices -- offers a parad...

Imagine this situation: A coworker calls you in a panic. He's facing a fast-approaching deadline, and you are the only person who can help him succeed in getting some critical task done. This hypothetical coworker explains to you what he's working on and how it's critical to the success of the orga...

EXPERT ADVICE

To Pilot or Not to Pilot Enterprise 2.0?

To drive productivity and organizational effectiveness, a new approach to Enterprise 2.0 is required -- one that puts the business user and business problem at the epicenter to tap an organization's innate social intelligence. In order to reach that level of efficiency and effectiveness, it is neces...

Now, more than ever, businesses want to work smarter and outdistance their competition to gain an edge. As a result, many are adopting converged communications technologies such as VoIP, collaboration, workforce mobility, and unified communications to accomplish these objectives. Converged communica...

INSIGHTS

Is the IT Pendulum Winding Down?

If you've been in IT long enough, you've probably heard someone observe that, for as long as there have been computers, there has been a long, slow pendulum swing between centralized and distributed computing paradigms. From mainframes, to remote terminals, to timesharing, to PCs, to client/server,...

EXPERT ADVICE

Redefining Endpoint Security

Most security professionals believe that endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which in this case...

The word "hurricane" means "evil wind spirit" -- and the 2010 hurricane season is predicted to be the most active of the past five years. In fact, in just the first two weeks of the season there were nine named storms in the Atlantic basin. So if the technical disaster recovery plan that you have in...

Windows OS High Availability is a tricky part of your disaster recovery planning. Many Microsoft and third-Party server tools and platforms come with some form of native HA toolset, and for the larger portion of these, Microsoft Cluster or Failover Clustering are the tool of choice. Enterprises ma...

EXPERT ADVICE

The Converged Media Road to Success

With the introduction of advanced smartphones, e-readers and tablets, it's hardly surprising that consumption of online content has grown exponentially. This has caused turmoil within the media industry. Traditional advertising revenues are declining as new marketing options are emerging. Print medi...

Technewsworld Channels