Articles
There were tons of sessions at Microsoft's Ignite conference besides mine that were good. I know it’s tough to believe. And I went to a couple myself. One of the biggest and most well attended was a little session called What's New for IT Professionals in SharePoint Server 2016.
Continue reading...
When you hear a term like SAP Store, a place to buy branded merchandise probably comes to mind. A web site where enthusiasts can get logo-wear like baseball caps, polo shirts, coffee mugs, you name it … After all, Oracle has one, so does Tableau, ditto for Cloudera. But
Continue reading...
On the final day of Microsoft’s first Ignite conference in Chicago, a standing-room-only crowd made up entirely of admins listened to independent consultant, author and lecturer Mark Minasi as he led them on a discussion of the forthcoming benefits and near-term headaches (at least hopefully near-term) of administrating users of
Continue reading...
Remember the good old days of open source, when your main concern was whether you might have inadvertently violated a license or piece of intellectual property? And if you did, well then at worst you'd have to turn over a piece of that software code to the open source community?
Continue reading...
Think your organization is safe if it minds its own security? Think again. You’ve also got to worry about security at all those companies you associate with, from suppliers and consulting firms to PR agencies, systems integrators, event planners and even heating and cooling vendors.
Continue reading...
Since Microsoft unveiled SharePoint back in 2001, it has been one of the fastest growing products in the software giant's history. Along with billions of dollars in revenue, the platform now boasts 125 million users and counting.
Continue reading...
Why is the distance from data to discovery so long? Show me someone who works with big data, and I’ll show you someone who has asked the question.
Continue reading...
What's the best defense against cybercrime? Surprisingly, it might be a big mouth. Sharing information about threats and risks is quickly becoming the expected starting point for any credible defense. And as proof, you need look not further than recent examples in the public, private and non-profit sector.
Continue reading...
The cyber attack against Sony Pictures revealed a treasure trove of titillating sensitive corporate data: emails that revealed the true feelings of certain producers for certain movie stars, sensitive compensation data for employees up and down the company's food chain, and scripts of future movies.
Continue reading...
File share projects don't culminate in casual review of file extensions. The fun is just beginning. The next steps should include 'easy deletes', baseline statistical capture, and thoughtful project management.
Continue reading...
The CIO of a global Medical Device manufacturing company recently said to me, "I don't want to have to install another piece of software at this company unless I absolutely have to." "You want to hear something that will really blow your mind?" he followed.
Continue reading...
Displaying 43-53 of 53