Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
The perils of phishing
How criminals use emails specifically designed to gain access to your personal information as well as your company's network and details how they entice employees to fall victim to phishing.
The evolution of ransomware
How different types of ransomware work, not just from a technological point of view but also from a psychological viewpoint.