Blog

How Next-Generation Data Protection is Redefining Backup

(This article was written by Lynn Lucas for Cohesity and originally appeared on choesity.com )

IT decision makers know certain truths about secondary storage and data protection. Among them: Storage workloads are spread across fragmented silos in the data center – backups, archives, files, objects, test/dev, analytics.

The “One Size Fits All” Approach to Digital Transformation and Other Myths

One of the most important things to understand about digital transformation is that the process itself is not a "one size fits all" affair. Think about it like this - part of what digital transformation allows you to do is better position your own company in a way that lets you continue to meet the needs of your ever-changing audience, regardless of what those needs happen to be at any given moment.

Five fundamentals of cloud security

(This article was written by Douglas Paris-White and first appeared on the IBM Cloud Blog)

Here are summaries of the five kinds of security a cloud platform should offer.

1: Identity and access management (IAM)

Any interaction with a cloud platform should start with establishing who or what is doing the interacting—an administrator, a user, or even a service.

Are You Prepared for a Total Disaster? [Infographic]

Business leaders are different than regular people. When they hear the word “disaster,” they don’t think about how to run or hide. No. They think: How will we recover from this? What should we have done to prevent it?

It’s this kind of clear-eyed determination that has made your enterprise such a success.

5 Signs IT Might Be Holding You Back

It’s a common problem. After years of hard work growing your business, you’re finally connecting with your target audience and becoming a real player in your market. Now it's time to grow. But scaling your business presents a whole new set of challenges.

Splunk in Higher Education

I recently had the opportunity to spend a half day with the Splunk team in our Dallas based office who works with Higher Education Colleges, Universities and Community Colleges. It was really an eye opening discussion to say the least. First off, it might be my age - let’s just say “over 40” for sake of discussion here - but you have to erase everything you remember about your days in college, right? For many like me, that is actually quite easy, but for different reasons than you’re probably thinking.

How Digital Transformation Matters More Than Ever

“Digital transformation" may have begun life as something of a buzz term, but it has long since evolved. If anything, it's a metaphor - one that helps better define where your organization is today, where it hopes to be tomorrow and the tech-driven journey to connect the two.

Cima at the 2018 TAGITM Education Conference!

The 2018 TAGITM Education Conference will be held April 24-27 in San Antonio, Texas. This year’s event—40 Years of TAGITM: From Bytes to Beyond—is shaping up to be the best conference to date! And the team at Cima Solutions Group is excitedly making plans to be on hand to demonstrate our IT services and solutions we offer for state and local governments.

IaaS for Small Businesses – The Right Choice?

The modern world runs on data. Lots and lots of data! Some of Silicon Valley’s largest tech giants such as Facebook and Google have amassed great fortunes through the commoditization of data. Whether it’s personal information, financial transactions, business documents, photos, or videos, people create 2.5 quintillion bytes of data every day.

The Need for a Small Business Security Audit

As cyber security threats continue to increase, Small Businesses need to constantly assess and resolve their IT vulnerabilities.
These days, no business can avoid the issue of cybersecurity. From agriculture to software development, small businesses that want to take advantage of today's technology need to recognize the consequent need to find and maintain system security.