Quantcast
Channel: Computer Technology Review » Steve Schone
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ISO 27001 – How to set up an information management system

Which requirements are recommended to fulfill for IT and business managers to obtain an ISO 27001 certificate? Learn from the 7 worst and the 7 best practices regarding the implementation of a security...

View Article



Image may be NSFW.
Clik here to view.

Q1 2014 Global DDoS Attack Report

Prolexic’s latest DDoS attack report shows that Q1 2014 once again set a new record for the largest DDoS attack ever. Compared to the same quarter one year ago, peak attack bandwidth increased 133%...

View Article

Image may be NSFW.
Clik here to view.

Transparency in the Public Cloud: Eliminating Public vs Private Tradeoffs

A Best of Interop 2014 finalist, analysts and media agree that the new iland Enterprise Cloud Services portal provides unmatched visibility into the true costs of cloud as well as performance, security...

View Article

Image may be NSFW.
Clik here to view.

Iland is Ranked as a Leader in Cloud-Based Disaster Recovery by Independent...

iland takes top scores for Current Offering and Strategy in "The Forrester Wave™: Disaster-Recovery-As-A-Service Providers, Q1 2014," Forrester Research, Inc., January 17, 2014. The post Iland is...

View Article

Image may be NSFW.
Clik here to view.

Top 25 Awards

        CTR’s, chief editor Kim Borg, is compiling a list of “Top 25 Must Have Software Applications” from recognized leaders within the IT software application space. Selected manufacturers will not...

View Article


Image may be NSFW.
Clik here to view.

Cutting Through the Wi-Fi 802.11ac Hype

by Bruce Miller The latest Wi-Fi standard, 802.11ac, was approved in January 2014 and for the first time, enables Gigabit speeds over wireless operating three to 15 times faster than the previous...

View Article

Image may be NSFW.
Clik here to view.

Continuous Monitoring and Response Realities

by Kim Borg Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumerization,...

View Article

Image may be NSFW.
Clik here to view.

Continuous Monitoring and Response Realities

by Kim Borg Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumerization,...

View Article


Image may be NSFW.
Clik here to view.

Top 25 Must Have Applications

          CTR’s, chief editor Kim Borg, is compiling a list of “Top 25 Must Have Software Applications” from recognized leaders within the IT software application space. Selected manufacturers will not...

View Article


Image may be NSFW.
Clik here to view.

Top 25 Awards

          CTR’s, chief editor Kim Borg, is compiling a list of “Top 25 Must Have Software Applications” from recognized leaders within the IT software application space. selected manufacturers will not...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images