Getting hacked is hardly an exciting thing, let alone something companies want to think about. Unfortunately in the climate of the way things are today, despite all the preventative measures you take, you are still at risk. So, what do you do if you get hacked? Here is a plan for how to coolly come […]
The Importance of Network Security
In relation to recent major security attacks it’s time to think about security as an issue for everyone. Just last week, Penn States University experienced and discovered a two-year long security breach. The university disconnected its College of Engineering’s public Internet after discovering an intrusion that has been ongoing since at least September of 2012. […]
Understanding IT Outsourcing Risk: Incorporating Risk Management into Your IT Sourcing Strategy
Decisions on outsourcing often have long-term implications; for this reason, understanding how IT organizations and executives make their decisions, and value and manage risk is an important part of IT outsourcing. Often times, poor decision-making result in lock-in effects that pose detrimental risks to competitiveness of the company, challenge the organization’s morale, and have significant […]
Colocation and Cloud – Does Your IT Team Know the Difference?
Know the Difference Between Colocation and Cloud Colocation, much like virtualization, is often mistaken for cloud even by IT teams with years of experience. Despite some similarities, the difference between colocation and cloud is vast – the two technologies are worlds apart. While colocation is a data center facility in which a business can rent […]
The Cloud Takes Biotech Research to a Higher Plane
With advanced biotech laboratories using cloud based platforms and streamlined processes and making their services available to any research facility or lab, life science experiments and research will become much simpler, so much so, that some claim it will be as easy as launching a new app. Whereas a routine experiment, if all went according […]