General

Last Updated on 13 Jan. 2015, Total: 156 Blog Posts

  1. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  2. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  3. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  4. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

  5. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 2

    Part 2 of blog post 'Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know'... Read More

  6. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  7. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  8. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  9. Alert Logic key findings about the state of Cloud Security

    The cloud is not inherently less safe. Among the six security incident categories examined, Web application attack was the only threat category more prevalent in cloud hosting provider environments than in enterprise environments... Read More

  10. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

Featured Links