The Rise of Deep Learning in the Enterprise

In a recent IDC report IT decision makers believe 75% of enterprises applications will use AI by 2021. Artificial Intelligence is not a new solution in fact we have seen various cycles of […]
Read More

IT security policies your company needs

When it comes to Internet security, most small businesses don’t have security policies in place. And considering that employee error is one of the most common causes of a security breach, it makes […]
Read More

New Report Shows Correlating Network and Endpoint Data is Highly Manual

We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and […]
Read More

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) […]
Read More

How business continuity plans can fail

Just because your IT provider has a plethora of awards and certifications under its belt doesn’t mean that you can blindly hand over your business’s future to them. Often times, there are some […]
Read More

5 Most Common Application Performance Issues

Some things never change: application performance issues Flashback to twelve years ago when I was working at Mercury Interactive on their managed service for application performance management (APM
Read More

Machine Learning: Beyond the buzzword

We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for […]
Read More

How Antifragile Systems of Trust Can Strengthen Blockchain Initiatives

What doesn’t kill us makes us stronger. We resist gravity, and our muscles become stronger. We negotiate conflicts, and our emotional intelligence increases. But what if this also applied to IT […]
Read More

How to reduce your PC power consumption

Every home or office has a computer. In one year, a typical desktop that’s on 24/7 releases carbon dioxide that’s equal to driving 820 miles in an average car. To save energy, you don’t need drastic […]
Read More

Can AI enhance your e-commerce business?

Artificial intelligence (AI) or “machine learning” has quickly transformed from science fiction to reality, and is currently on track to become an integral part of the corporate business environment. […]
Read More

Virtualization vs. Cloud Technology (for business): Spotting The Differences

Are virtualization and Cloud technology adequate for your business? Do you know the difference? Experts consider the word 'Cloud' as a generic term, while 'virtualization' is often mistaken for […]
Read More

Networks and IoT Play Nice Together in the Digital Age

The Internet of Things (IoT) is gaining serious momentum these days, especially now that digital transformations are well underway.
Read More

Learn the basics of EHR hardware

Ease of access, legibility, and accuracy are key considerations when maintaining health records, especially to ensure compliance with industry regulations. With an EHR system, navigating through […]
Read More

How to Close the IT Monitoring Visibility Gap and Offer an Optimal User Experience

When it comes to digital transformation and cloud-first strategies, the Netherlands is leading. Big data, cloud and Internet of Things (IoT) are all firmly established trends among forward-looking […]
Read More

Why businesses need web monitoring

The internet is indispensable for improving business productivity, but it’s also an outlet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important […]
Read More

Office 365 security considerations

It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, […]
Read More

New Spectre-style attack discovered

Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s a quick rundown of the […]
Read More

Pandas, Caviar, and Deep Learning

Analytics is redefining the world. Data is the new oil. Artificial intelligence (AI) is everywhere
Read More

Causes of call-quality issues of VoIP

Phones are absolutely essential to any company’s communications arsenal. And after Alexander Graham Bell made the first coast-to-coast long-distance call in 1915, it was clear that this was […]
Read More

How Cybersecurity Can Unite the CFO and CIO

In my previous blog, I shared some thoughts about why a strong CFO-CIO collaboration is the key to success in the digital world. With five new types of cyberthreats popping up every second, […]
Read More

The new essential device for healthcare

Last week, I had a scare.
Read More

What is all the 802.11ax Hype About?

Over the past two decades, we have witnessed massive advancements in Wi-Fi technology. The six different wireless standards have brought ever faster speeds and greater functionality. From 802.11 […]
Read More

Is Your Organization Ready for Digital Transformation?

While digital technology is opening entirely new ways of doing business, some organizations fall short of their ambitions and instead settle on improving existing ways of operating.
Read More
1