Now that Google Glass is enterprise-only, it is more appealing than ever

google_glass_2

The first generation of Google Glass spectacularly failed to get off the ground despite a long beta period. The second generation is on the cards, and it has an enterprise focus which serves only to make the hardware even more appealing. There's no release date, or even a vague schedule for release, yet, but images of the next version of Google Glass have appeared online.

A new filing with the FCC shows just what we can expect from the next version of Google Glass, and it's extremely promising. While there's no suggestion of a consumer model being released, what we learn about the enterprise edition will serve only to make it more appealing to the masses -- great looks, a foldable design, and a larger display. Will Google bow to the pressure that's almost certain to mount and try again with a consumer version?

Continue reading

Adoption of cloud computing in the enterprise: The progress in 2015

clouds cloud sundown sunset

In general, cloud penetration across the enterprise in terms of workloads being completed continues to be at a relatively low level, with many analysts firms reporting that penetration is at rates of less than 10 percent.

That said, the journey has begun in most organizations and Ovum has identified that nearly 75 percent of organizations will adopt some hybrid cloud strategy by 2016.

Continue reading

The future of data center infrastructure management [Q&A]

IT server data datacenter enterprise

Recent research from Intel suggests that, despite the availability of automated solutions for data center infrastructure management (DCIM), many businesses are still using manual procedures to do their capacity planning and forecasting.

To get an insider perspective on how managers can better exploit the benefits of DCIM products to streamline their operations we spoke to Jeff Klaus, General Manager of Intel Data Center Solutions.

Continue reading

Expect faster adoption and more localization in a cloudy 2016

2016 cloud

The growing maturity of the cloud has been one of the major trends of the past year and this is something that looks set to continue into next year.

There will be new challenges, however, and we've looked at what some of the industry's experts think the cloud will have in store for 2016.

Continue reading

Managing mobile apps in large enterprises [Q&A]

mobile cloud enterprise

More and more businesses are rushing to embrace mobile apps, but in large companies where hundreds of apps need to be rolled out this can present major headaches for administrators.

We spoke to Chris Isbrecht of IBM Security's MaaS360 team to find out about some of the challenges of scaling mobile to large enterprises, as well as how they can be addressed.

Continue reading

What you need to know about VPNs

Virtual Private Network VPN

A virtual private network (VPN) brings additional security to anyone using a public network, such as the Internet. Using a variety of security methods, such as encryption, the VPN is able to safeguard any data transmitted across the network, which may be at risk if it simply used the underlying public network infrastructure.

VPNs are often employed when it would not be practical to use a physical private network, usually due to financial reasons. As businesses embrace mobile working and face increasing pressure to protect sensitive information, many are employing virtual private networks to improve their network security.

Continue reading

The enterprise trends of 2015

Graph

Businesses tend to be quite conservative in their approach to technology, so it's always interesting to look at what's been sparking their interest.

Identity and mobility management specialist Okta has released a new report, based on analysis of its customers, looking at the big winners and losers in the enterprise over the past year.

Continue reading

Human behavior is the biggest threat to company security

unknown threat

A new survey of cyber security professionals from information management company Nuix shows that businesses are placing greater emphasis on insider threats.

The report reveals that 71 percent of respondents report that they have an insider threat program or policy, and 14 percent say that they allocate 40 percent or more of their budget to insider threats.

Continue reading

Enterprise mobility will be the main IT focus in 2016

Business mobile devices

According to a new report from Harris Poll announced this week, enterprise mobility will top IT investments in 2016. The survey reveals that more than 90 percent of IT Decision Makers (ITDMs) see enterprise mobility as the critical function for customer engagement, competitiveness and operational productivity in 2016.

Additionally, nearly three in four (73 percent) respondents indicate that they intend to mobilize their whole organization.

Continue reading

Survey reveals managers and developers split on real time data analysis

Data center worker

According to the results of a new survey, 84 percent of CIOs believe their organization can analyze data in real-time, however, only 42 percent of developers agree with that statement.

This difference of opinion is one of the findings of the study by in-memory data platform specialist VoltDB. Where 91 percent of CIOs, IT managers and developers do agree is that real-time streaming data analysis can have a positive impact on their company's bottom line.

Continue reading

Fake reviews: why and how businesses can steer clear of fraudulent content and gain consumers' trust

FAKE

With the growth of mobile usage reaching 1.5 billion of users globally, consumers today have easy access to content about a brand, its products and services, as well as tools to quickly create and share opinions, photos and videos, across a variety of social media channels. However, out of all this content, we have recently seen numerous instances of brands fighting fraudulent forms of it. Amazon, for example, announced its plans to sue 1,114 fake reviewers, claiming that the brand reputation is being damaged by "false, misleading and inauthentic" reviews paid for by sellers seeking to improve the appeal of their product. This is the second suit by the online retailer this year, clearly showing that the proliferation of fraudulent online reviews is becoming a critical issue for businesses to address.

Yet consumers have not lost faith in online reviews -- in fact, a survey reveals online reviews impact 67.7 percent of respondents' purchasing decisions. More than half of the respondents (54.7 percent) also admitted that online reviews are fairly, very, or absolutely an important part of their decision-making process, showcasing how much consumers today value authentic peer to peer recommendations. Brands therefore need to take actions to ensure consumers can still rely on and have access to only authentic consumer-generated content (CGC), such as reviews.

Continue reading

Apple and IBM partnership reaches 100 enterprise apps milestone

handshake

Apple and IBM today announced that they have reached the 100-app milestone in their mobile partnership, covering 60 professional roles across 14 different industries including government, transportation, healthcare and telecommunications.

Maribel Lopez, principal at Lopez Research said: "I think [Apple] brings the concept of simplicity (direct to task) and beauty to enterprise apps. IBM on the other hand understands business workflow, what generates productivity and back-end integration".

Continue reading

Desktop and mobile habits of employees revealed

Office staff

Do you know how your employees are accessing content within your business? Enterprise file sharing specialist Egnyte has analyzed all of the unstructured data from its customers, no matter what device, storage, or apps they use, to discover the latest trends.

Having looked at this data over the last 12 months, they uncovered some interesting facts about the diversity of employee interactions with their company content.

Continue reading

P2P file sharing and its impact on business

P2P file sharing

When you think of peer-to-peer file sharing you probably bring to mind services like Kazaa and Limewire that were among the early sites allowing users to share media, or of more recent operations like Pirate Bay.

But while it's easy to think of P2P in terms of individuals downloading music or movies, a new report from security rating company BitSight reveals that it’s a problem for businesses too.

Continue reading

New breach detection solution alerts enterprises to insider threats

insider threat

For enterprises and government departments the biggest threats can often come from within the organization rather than outside it.

Detecting these insider threats can be difficult which is why security company Eastwind Breach Detection is launching a new platform that uses rich data, behavioral analytics, and threat intelligence to pinpoint anomalous behaviors even before they're classified as breaches.

Continue reading

Load More Articles