Networking Articles

  1. What You Missed At Ingram Micro ONE Fall 2015

    Last week I was one of 2,000 people who attended the Ingram Micro ONE fall conference in Nashville. I have 10 full pages of notes from the event. Following are some highlights I thought you’d find valuable, along with my commentary.

  2. Storage Automation Benefits Include IT-As-A-Service Delivery

    SolidFire, a provider of all-flash storage systems, released survey results that offer insights into how IT professionals are benefitting from automation of the storage layer. The 2015 Storage Automation Report is based on the survey that was conducted by independent research organization TechValidate of more than 300 global IT professionals. By Christine Kern, contributing writer

  3. Intel Security: 2016 Cybercrime Predictions And What VARs Can Do For Their Clients

    Intel Security’s McAfee Labs released predictions for cybercrime next year and beyond to 2020 in the McAfee Labs Threat Predictions Report.

  4. Research Finds $30 Billion Wasted In U.S. On Unused Software

    Global organizations are wasting money on software that is not used, according to a new report from Software Lifecycle Automation company 1E. The report The Real Cost of Unused Software analyzed the results of a four-year study of more than 1,800 software titles deployed on 3.6 million desktops, in 129 enterprises, across 14 industries.

  5. CompTIA: Lack Of Cyber Security Knowledge Is Harmful To Organizations

    In a recent experiment designed to discern common attitudes and behaviors regarding cybersecurity, CompTIA revealed that nearly one in five people who found a random USB stick in a public setting would use it, opening themselves — and possibly their employers — to cybersecurity risk. By Christine Kern, contributing writer

  6. How Cloud-Based Applications And Services Can Grow — And Protect — Your Business

    In this exclusive interview with Business Solutions, David Byrd, CMO and VP of Operations for CloudRoute, lists benefits of delivering cloud-based applications and services, and also explains why this may be necessary to protect your IT solutions provider business.

  7. Attention VARs: Benefits Administration Is Ready For The Cloud

    Cloud computing is continually popping up as a welcome entrant in different areas in the world of healthcare, and this time, it’s benefits administration.

  8. CompTIA: Younger Workers’ Tech Preferences Could Impact Workforce Dynamics

    Among the trends shaping the workplace of the future are increasingly blurred lines between personal and work lives, a greater emphasis on social media engagement, and stronger views on technology, according to new research from CompTIA, the IT industry association.

  9. Fix For Unnamed Java Vulnerability Could Be More Challenging Than Heartbleed

    A vulnerability originating from a commonly used Java library could be “the most underrated, under hyped vulnerability of 2015,” according to Steve Breen, principal consultant for NTT Com Security. By Christine Kern, contributing writer

  10. What IT Solutions Providers Need To Know About Their Clients’ Security Risk

    Skyhigh Networks has released its latest quarterly Cloud Adoption and Risk Report, which found that the average enterprise faces more than 16 insider threats, exploited account credentials, and data exfiltration incidents per month.