All articles by Cbr Rolling Blog

Cbr Rolling Blog

Guest Blog: Reliable voice recognition for authentication is at least a decade away

Andy Kemshall, co-founder and technical director at SecurEnvoy, speaks up about voice recognition as a security tool.

Wherever IT may roam

David Milot, Unisys’ managing partner for Technology Consulting and Integration Solutions, on the concept of ‘Workspace as a Service’ and how it might support BYOD.

Guest blog: Big data meets the cloud

Len Padilla, VP of product strategy at NTT Communications in Europe, on unlocking the full value of big data with cloud computing.

Guest blog – Big data: big opportunity, big security questions

Paul Ayers, VP EMEA at Vormetric on the security implications of big data analytics.

Guest blog: Why BYOD tops challenges

Joakim Sundberg, worldwide security solution architect at F5 Networks, on why the majority of businesses are unprepared for DDoS and still unsure about securing BYOD.

HP responds to government attacks on large IT suppliers

Says ‘digital’ is merely a ‘veneer’

Mobility – The technology tsunami

Steve Cardell, president at HCL EAS (Enterprise Application Services) on the impact of mobile on the enterprise.

Big Data: don’t neglect the network

Nathan Pearce, F5 EMEA product manager argues the network is as vital as ever in the era of Big Data.

The General Counsel’s perogative

Should the General Counsel play a key role in informing IT strategy? Steve O’Neill, CFO of EMEA Strategic Operations at EMC and David Eastwood, Partner, KPMG UK argue that an understanding of the implications of enterprise technology trends should be a priority.

1E says migrate to Windows 7 or 8 now

Extended Windows XP support nearly over