The influx of employee-owned mobile devices into the workplace has certainly thrown many IT security professionals for a loop, but the same devices that are introducing so much chaos to established security practices also have a lot of potential to be used to bring back some order. The following mobile security tools are a good start for security admins looking for utilities to help them get their job done more efficiently.
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
Research: 2014 State of the Data CenterOur latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
6 UC Trends to WatchInformationWeek’s 2014 Unified Communications Survey shows a revitalized market; 77% of 488 respondents have deployed UC or plan to within 24 months. Among those deploying or with plans, internal IT owns this tech: 40% will keep UC completely on premises vs. 3% going all cloud. For hybrid setups, 24% are primarily on premises vs. 17% mostly cloud.