IBM


Bring on the BYOD Chaos — MaaS360 Has You Covered

“Command and control” always seems like a good idea even though it almost never is. It sounds like one person gives the orders and then people do as they are told. This is, of course, most appealing if you get to be the person in...

Close to Home: IBM Puts Its Trust in Endpoint Manager, MaaS360

Remember that commercial where the guy says he’s not just the president of the company, he’s a client, too? Hard to argue with someone who trusts the product that much. Which is why you might want to know that IBM didn’t just...

Take the Blinders Off Your Service Desk

You can’t fix what you can’t see, and in an enterprise increasingly relying on mobile, virtualized and cloud assets, that can be a real problem for service desk operations. IT service management (ITSM) is a huge factor in the...

Don’t be distracted by the Sharks. Look for the Snails!

Shark Week is really a genius idea. Shark Week is an annual event on The Discovery Channel of nothing but shark-related programming, real and fictional. It began in 1988 and is insanely popular, which is why it is the...

Why You Need to Take a ‘Gung Ho’ Approach When Protecting Your Data and Enterprise

There’s nothing better than having a team where all the members are gung ho about what they’re doing, right? If you have that, you know nothing is going to prevent them from getting the job done. You know that and pretty much...

Watch for the Invisible Gorilla

Would you notice a man in a gorilla suit walking past you on the street? While you may think, “Of course!” the real answer is probably not. Here’s the proof: In 1999 Professors Christopher Chabris and Daniel Simons, who study...

Simplifying the Complex: datacenter management made easy

Don’t you hate getting advice you didn’t ask for? It usually shows up when you have a problem, which is when you least want it, and frequently it’s a suggestion to do something you’ve already done. “Did you try re-booting?” “What...

Why can't we be friends? PC + Mobile: Unified Endpoint Management

When you’re dealing with power supplies, parallel operation can be a good thing. But when it comes to endpoint management strategies, parallel may seem more like dealing with alternate realities. For many companies, mobile access...

Data breach doorways: Are you handing out keys to cyber burglars?

Would you feel safe if 1,000 people had a key to your house? How about 10,000? Well, no homeowner would ever do that, right? But some businesses do it every day—maybe even yours. How many laptops are in your organization? How many...

Don’t Get Complacent with Compliance – Get Continuous Protection

Remember newspapers? Not newspaper sites, but actual dead tree newspapers? Yeah, they’re still around but they’re definitely looking more and more like a 20th century leftover. Part of the reason for that is the convenience of...

The Power of ITIL and The Problem with Gurus

Is just being good at your job really still enough? For a long time, it was only results that mattered. As long as you delivered those, people tended not to be overly concerned about how the job got done. It didn’t matter if you...

Load More