freemium - News, Features, and Slideshows

News

  • What to do in the event of a data breach?

    Even though it now appears there was no terrorist attack on a pump at an Illinois water utility, the SCADA infiltration scare was a reminder that data breaches can come from any number of angles.

    Written by Ryan Francis07 Dec. 11 08:41
  • Make BI business as usual

    If 1-800-Flowers.com CIO Steve Bozzo had his druthers, even the online retailer's mailroom clerks would have access to business intelligence. "There's valuable information at every level of the organization," he says.

    Written by Beth Schultz06 Dec. 11 01:53
  • InfoWorld review: Heroku cloud application platform

    Heroku is a pure platform as a service -- that is, the entire infrastructure is managed by Heroku and not by you. As such, deploying a Ruby application, whether or not it is Rails based, is practically effortless. Deployment, in fact, is performed as a part of a regular SCM (software configuration management) sync via <a href="http://www.infoworld.com/d/application-development/torvaldss-git-the-it-technology-software-version-control-167799">Git, an innovative, freely available, and quite popular distributed source code management system pioneered by Linus Torvalds</a>, the creator of Linux.

    Written by Andrew Glover01 Dec. 11 06:17
  • InfoWorld review: Engine Yard Cloud

    Although code deployment might not be as easy with Engine Yard as with <a href="http://www.infoworld.com/d/application-development/infoworld-review-heroku-cloud-application-platform-180342">Heroku</a>, the Engine Yard platform is dramatically more tunable. In fact, in many ways, Engine Yard is closer to an infrastructure as a service (IaaS) than a platform as a service (PaaS). Engine Yard provides a base infrastructure tuned to run Ruby applications, but the rest is up to you. Engine Yard does offer <a href="http://www.infoworld.com/d/application-development/torvaldss-git-the-it-technology-software-version-control-167799">Git integration</a>; however, deployment is not executed via a push, as in Heroku, but rather via Engine Yard's suite of tools and its extensive dashboard, which can sync with a Git repository.

    Written by Andrew Glover01 Dec. 11 06:07
  • The inside story of why Puma dumped four Cloud vendors for one

    Cloud's ability to ratchet server power and storage up and down as needed suits the demands of online marketing campaigns that tend to gear up and wind down quickly. So a few years ago, sneaker manufacturer Puma ran fast toward adoption.

    Written by Kim S. Nash01 Dec. 11 05:47
  • Mobile mania spurs demand for unified communications

    In the space of just the past few years, Art Johnston has gone from thinking of unified communications as optional to viewing it as "a strategy that we need to implement to be competitive."

    Written by Mary K. Pratt01 Dec. 11 02:09
  • Tech arguments: then and now

    While standing around the water cooler in the IT department, perhaps you debate with a coworker about whether LinkedIn is better than Facebook. Or you argue with an end user about whether they can use their own device on the corporate network or can only use what is provided by the company.

    Written by Ryan Francis30 Nov. 11 05:50
  • The cloud security checklist

    Whether you're a small business relying on Google Docs for document sharing or an enterprise moving your global ERP system to the cloud, you should demand that some common security and compliance requirements are met by vendors providing applications and services over the Web. These requirements involve who can access your applications and data, as well as the systems hosting them; where the data is stored; and whether the data is hosted on dedicated, rather than on shared, hardware. They also ensure that you get detailed logs of who has accessed your data and applications so that you meet corporate and regulatory standards, and they verify that data is properly encrypted -- a factor that's more critical outside the corporate firewall.

    Written by Robert L. Scheier30 Nov. 11 04:49
  • Making sure your Cloud provider can protect your data as promised

    At the end of my Cloud Expo West presentation last week, I was asked, "How can we verify that a Cloud provider actually has all of these infrastructure and security mechanisms in place?" It's a great question, one that deserves a fuller answer than I was able to give in the time available.

    Written by Thomas J. Trappler29 Nov. 11 02:58
  • InfoWorld's guide to a successful BYOD and mobile IT strategy

    It's the biggest shift in IT in years: the consumerization-of-IT trend that gained major traction with the advent of the iPhone and other modern mobile devices, causing most businesses to let employees bring -- or at least choose -- their own smartphones and tablets, all in fewer than two years.

    Written by Galen Gruman23 Nov. 11 02:25
  • Off to a Fast Start

    Feeling like your business intelligence efforts are a bit sluggish and out of touch with what the company needs? Maybe it's time to try agile BI, a rapid development methodology that solicits end-user input early and often and delivers BI systems fast.

    Written by Bob Violino22 Nov. 11 02:08
  • Resume Makeover: How to Write an IT Executive Resume

    Henry Cole has held his position as an IT manager with a global life sciences company for nearly eight years. Like all ambitious IT managers, he wants to move up to the executive level. Cole believes he's ready to step into an executive-level IT management position with a large company or into the top IT management spot at a small company based on his accomplishments, positive feedback he's received from his employer, and recognitions with which he's recently been honored. Since there are no opportunities for career growth with his employer, he's looking outside his company, as he has been for the last year and a half.

    Written by Meridith Levinson18 Nov. 11 04:20
  • Cisco how-to guides for firewalls, IPv6, contact centers and security exams

    If you're ready for a technical deep dive in a book, the Cisco Networking Technology Series provides that in its collection of volumes on topics that include Cisco firewalls, Cisco Unity Connection voice-messaging platform, Cisco Contact Center, <a href="http://www.networkworld.com/news/2009/073009-ipv6-guide.html">IPv6</a> and more. Here's a quick review of the books published in this series by Cisco Press this year.

    Written by Ellen Messmer17 Nov. 11 09:20
  • How to get IPv6 addresses from ARIN

    Whenever I help a company deploy IPv6, the first question I'm asked is how to get provider independent IPv6 address space from ARIN. ARIN has new <a href="https://www.arin.net/policy/nrpm.html#six58">policy guidelines</a> that affect how a company approaches its allocation justification request for IPv6 vs. what was required for IPv4.

    Written by Ed Horley16 Nov. 11 07:38
  • Should social networks be blocked at work?

    One of the biggest trends in IT is how consumer products have crept into the enterprise, and the trend extends to Internet services. The ingenious thing about social networks such as Facebook and LinkedIn is that these consumer-oriented sites have become key tools for professionals.

    Written by Ryan Francis11 Nov. 11 09:44
[]