Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate. Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this is due to…

The Aberdeen Group states that cloud is the core, mobile its edge and social the connections are lie between endpoints. It places the disruptive technologies that are transforming businesses in context, and describes the technical and services infrastructure needed to provide that ideal end‐user experience where everyone’s connected (social), everywhere they go mobile, and have…

People are accustomed to using their beautifully-designed and easy-to-use productivity tools in their everyday life. As employees, they now have the same expectation for their work environment. Companies are allowing employees to use their own devices (BYOD) and adopt low-cost SaaS-based solutions to save IT substantial costs but this now renders concerns around security and…

More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. According to research by Gartner, half of the world’s companies will seek from their workers to individually provide devices for work by 2017. It is estimated…

As the number of tablets, smartphones, touch and connected devices are snapped up by consumers worldwide, the market for mobile applications is also expected to grow. Industry distribution of mobile applications is growing faster than the rate of sales of digital music, which used to be the undisputed leader in online sales. According to new…

The performance and power of mobile phones, along with the development of the infrastructure has made the business intelligence on mobile phones (which has been called Business intelligence on-the-go) a reality. Until recently, mobile BI solutions suffer from a lack of technological advances and use cases, even with the growing demand for access to real-time…

While cloud computing is in first place among the technologies of interest to the corporate sector, the industry is a struggle for professionals in this field. In 2012, more than 1.7 million jobs in the field of cloud computing remain unoccupied, according to analysts firm IDC. The reason for this is lack of qualifications and…

IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing. Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result…