All articles by Cbr Rolling Blog
Guest Blog: Reliable voice recognition for authentication is at least a decade away
Andy Kemshall, co-founder and technical director at SecurEnvoy, speaks up about voice recognition as a security tool.
Wherever IT may roam
David Milot, Unisys’ managing partner for Technology Consulting and Integration Solutions, on the concept of ‘Workspace as a Service’ and how it might support BYOD.
Guest blog: Big data meets the cloud
Len Padilla, VP of product strategy at NTT Communications in Europe, on unlocking the full value of big data with cloud computing.
Guest blog – Big data: big opportunity, big security questions
Paul Ayers, VP EMEA at Vormetric on the security implications of big data analytics.
Guest blog: Why BYOD tops challenges
Joakim Sundberg, worldwide security solution architect at F5 Networks, on why the majority of businesses are unprepared for DDoS and still unsure about securing BYOD.
Mobility – The technology tsunami
Steve Cardell, president at HCL EAS (Enterprise Application Services) on the impact of mobile on the enterprise.
Big Data: don’t neglect the network
Nathan Pearce, F5 EMEA product manager argues the network is as vital as ever in the era of Big Data.
The General Counsel’s perogative
Should the General Counsel play a key role in informing IT strategy? Steve O’Neill, CFO of EMEA Strategic Operations at EMC and David Eastwood, Partner, KPMG UK argue that an understanding of the implications of enterprise technology trends should be a priority.