By Tom Nolle The Internet of Things will usher in a transformation that will change networking’s focus from resource access to answering questions. The Internet transformed networking not because of IP, but because it presented a new model for consumer communications. Before the Internet, “communication” was among connected sites, something Read More… By Jim O’Reilly Much like the advent of hypervisor virtualization, container-based virtualization requires updates to server architectures for better security alongside high performance. Recent architectural and cloud computing advances are helping put virtualization containers into production data centers. Continue to Techtarget.com to read full post>> Read More… In almost every case, the ultimate goal of a cyberattack is to steal and exploit sensitive data, regardless if a hacker is after the customer’s credit card information, or an individual’s credentials to misuse his or her identity online. Different levels of targeting exist for various reasons and Read More… By Sean Michael Kerner At the beginning of every new year, vendors and tech pundits alike look ahead to what’s next for IT security. While I understand the need to do so to help identify coming threats and emerging trends, the simple truth is that for the vast majority of Read More… Before the rise of the application economy, IT infrastructure was a service published to the rest of the organization. The systems were configured and maintained by operations. If there was a new request, the request was made, and then executed by the operations team. The emergence of a fierce application Read More…