Serena Software is a software change and configuration management vendor, right? It has recently released its Dimensions CM 14 product, with additional functionality driving Serena more into the DevOps space, as well as making life easier for distributed development groups to be able to work collaboratively through synchronised libraries with peer review capabilities.Read Blog
For a relatively new market, there is a lot happening in the world of big data. If we were to take a "Top 20" look at the technologies, it would probably read something along the lines of this week's biggest climber being Hadoop; biggest loser being relational databases and staying place being the less-schema databases.Read Blog
Many headline IT trends are driven by organised marketing campaigns and backed by industry players with an agenda - standards initiatives, new consortia, developer ecosystems - and need a constant push, but others just seem to have a life of their own.
Quocirca research reveals that enterprises place a low priority on print security despite over 60% admitting that they have experienced a print-related data breach.
Any data breach can be damaging for any company, leaving it open to fines and causing damage to its reputation and undermining customer confidence. In the UK alone, the Ponemon Institute estimates that in 2013, the average organisational cost to a business suffering a data breach is now £2.04m, up from £1.75m in the previous year.Read Blog
In today's world of acronyms and jargon, there are increasing references to the Internet of things (IoT), machine to machine (M2M) or a 'steel collar' workforce. It doesn't really matter what you call it, as long as you recognise it's going to be BIG.Read Blog
Although there is much talk of a move towards virtualRead Blog
desktops, served as images from a centralised point, for many organisations,
the idea does not appeal. Whatever the
reason (and there may be many as a previous blog here points out),
staying with PCs leaves the IT department with a headache - not least an estate
of decentralised PCs that need managing.
As the webRead Blog
has evolved so have the security products and services that control our use of
it. In the early days of the "static web" it was enough to tell us which URLs
to avoid because the content was undesirable (porn etc.) As the web became a
means distributing malware and perpetrating fraud, there was a need to identify
bad URLs that appeared overnight or good URLs that had gone bad as existing
sites were compromised. Early innovators in this area included Websense (now a
industry commentators (not least Quocirca) constantly hassle IT managers to
align their activities more closely with those of the businesses they serve; to
make sure actual requirements are being met. However, that does not mean that
lines of business can stand aloof from IT and learn nothing from the way their
IT departments manage their own increasingly complex activities. Two recent
examples Quocirca has come across demonstrate this.
Everyone needs version controlRead Blog