Suppose there is a treasure at the top of a mountain worth$405B. It is more than one person alone can carry back down the mountain, and you have a chance at that treasure. Many people want the treasure and will work hard to get to...
It is an exciting day for Cisco and IBM; as it marks the next step in our long-term strategic relationship. I've blogged recently about the importance of industry collaboration. Within the vast world of technology, there isn't one...
Another day, another gathering focused on the evolution of technology at Code Conference. Big names, big ideas, and a lot to think about. Executives and activists. IBM, Google, Facebook, Gates Foundation, Twitter, Cisco, Musk... I...
Oil and gas executives are often asking these tough questions: Where is the oil industry going? How will it get there? How soon does it need to get there? I answered some of these points in a study I was proud to help create last...
Imagine a school where students use mobile devices to learn from anywhere at any time. Students can interact face-to-face with classmates around the world. Where students and educators who can't be present in a classroom can still...
Whether it's your first or tenth time at the INTX show, it is still an exciting and happening place. This year 9,000 attendees gathered at the INTX 2016 to learn about the best products and solutions which exhibitors brought to th...
In case you've missed it, the U.S. government has been making calculated decisions over the past few years modernize its approach to technology. That modernization, however, is much more than just buying the latest pieces of equip...
More than 1,800 customers are deploying Application Centric Infrastructure (ACI) because they see great value in its ability to automate IT tasks, accelerate application deployments and reduce data center TCO. According to Zeus Ke...
The post was authored by Mariano Graziano. Executive Summary Attacks have grown more and more complex over the years. The evolution of the threat landscape has demonstrated this where adversaries have had to modify their tactics t...
Earlier this year I had a bit of an "aha" moment. After a long day at Retail's Big Show#NRF2016 at the Jacob Javits Center in New York 25,000 people wanted to get back to their hotel -all of them, all at once, at 5 o'clock. I look...
Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direc...
Today's Guest Blog comes to us courtesy of Steve Vicinanza, CEO of Cirrity. As a reseller, your customers depend on you to fully qualify and carefully select the products and services you recommend. This is especially true w...