Today, we are thrilled to announce that Squadcast has officially joined the…
Read about wireless IoT protocols, and one feature will stick out above the rest. 6LoWPAN is a typical client addressing protocol. But what is it? The “6” gives us an…
From the government’s recently released Report on IT Modernization, calling for agencies to identify solutions to current barriers regarding agency cloud adoption, to the White House’s draft release of a…
One year after the launch of ITIL® 4, the Pink20 IT Service Management Conference followed up with a Batman theme — appropriate, given Batman is a superhero whose only superpower…
Researchers from different universities around the world have been studying fictional zombie outbreaks as an approach to investigating how different diseases could potentially spread. The investigations have resulted in different…
The consensus is software-defined networking in a wide area network (SD-WAN) will provide organizations unprecedented agility but possibly at the expense of security, as traffic flow changes to a distributed…
The ITIL framework is more than a best practice guide for IT service management (ITSM); it’s a way to design a strategy that creates value for the customer and service…
In this episode, Head Geek and overall database guru Thomas LaRock will lead a discussion of the newest addition to the SolarWinds database performance monitoring family–VividCortex. Thomas will be joined…
I’ve spent a lot of time thinking about the Internet of Things recently. Well, I’ve spent the last seven years thinking about IoT. Seven years ago, I bought my first…
The Defense Information Systems Agency (DISA) has a set of security regulations to provide a baseline standard for Department of Defense (DoD) networks, systems, and applications. DISA enforces hundreds of…
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation.…