Business

Selective two-factor authentication still leaves you vulnerable

Two-factor (or multi-factor authentication) is a very effective way of providing an additional layer of security for systems and data. It’s relatively trivial these days for attackers to compromise usernames and passwords, and two-factor authentication puts another line of defense […]

Selective two-factor authentication still leaves you vulnerable Read More »

Hyper-V Containers

Microsoft Hyper-V Containers add a layer of security to containerization

Container technologies like Docker are taking the IT world by storm. Containers are an effective and efficient way to develop and deploy apps. For companies that value or require security, however, traditional container platforms are inadequate. Microsoft developed Hyper-V Containers

Microsoft Hyper-V Containers add a layer of security to containerization Read More »

IBM Watson

IBM Watson supercomputer strives to achieve continuous value

The IBM Watson supercomputer simultaneously depends on and drives DevOps. It relies on DevOps principles because a self-learning cognitive system needs continuous monitoring and continuous improvement to keep up with the volume of data being analyzed. Without DevOps Watson would

IBM Watson supercomputer strives to achieve continuous value Read More »

Office 2016 IT Pro and Developer Preview gives admins plenty to look forward to

If you’re a consumer or end-user there isn’t much (if anything) to get excited about yet. For IT admins, however, the new and improved features in the Office 2016 IT Pro and Developer Preview are very good news. Microsoft has

Office 2016 IT Pro and Developer Preview gives admins plenty to look forward to Read More »

Scroll to Top