How to create a security strategy for IoTData captured by an enterprise IoT deployment must be kept safe if it's going to be useful. Here's how to build an IoT strategy that prioritizes security.May 2, 2018 by Conner Forrest in Internet of Things
IT must patch against Total Meltdown now: The source code is on GitHubA patch for Meltdown created an even bigger flaw for 64-bit Win7 and Server 2008 R2. Now, it's freely available.April 26, 2018 by Conner Forrest in Security
MinerEye launches AI-powered Data Tracker to bolster GDPR complianceThe tool can also help save on costs by identifying redundant data and making suggestions for mitigations.April 12, 2018 by Conner Forrest in Security
Vendor selection: What needs to be in a good policyProper due diligence when conducting a security audit with vendors can pay dividends for your organization.April 3, 2018 by Conner Forrest in Security
Five ways voice assistants are going to change the officeDigital assistants will fill roles that complement the work of human employees, improving productivity and efficiency.March 1, 2018 by Conner Forrest in Smart Office
VMware unveils new edge computing solutions to bolster enterprise IoT effortsAnnounced at Mobile World Congress 2018, the solutions will come through industry partnerships and focus on asset management and smart surveillance.February 28, 2018 by Conner Forrest in Edge Computing
The obstacles to autonomous vehicles: Liability, societal acceptance, and disaster storiesSelf-driving vehicles have made many strides, but certain barriers are preventing widespread adoption.February 1, 2018 by Conner Forrest in Innovation
The X-factor in our driverless future: V2V and V2IThe technology behind how vehicles communicate with one another and their surrounding environment will be the linchpin for the success of autonomous vehicles.February 1, 2018 by Conner Forrest in Innovation
Play VideoUnderstanding the 3 most important features of Redis Enterprise Pack 5.0Redis Labs CEO, Ofer Bengal, spoke with ZDNet about running Redis on flash, Active-Active Geo-Distributed Deployments, and RediSearch.December 5, 2017 by Conner Forrest in Big Data
Play VideoHow Accenture uses AWS services and the Amazon Echo to provide care for elderly usersAccenture's Chris Wegmann explains how the firm uses Amazon Web Services, the Amazon Echo, and the Amazon Show to keep elders more connected to their families and care providers.December 5, 2017 by Conner Forrest in Cloud