As artificial intelligence continues to move forward at a rapid pace, so too will demands on IT departments.
Articles by Joe Stanganelli
Insights on some of the latest, the oldest, and the upcoming developments in the ongoing IP wars between Cisco and Arista.
Follow network security policy best practices by using these tips to strengthen password requirements.
Cloud developers and cloud adopters are busting down their silos as they struggle to stay efficient, relevant, and competitive.
A recent Federal Trade Commission report on data stewardship issues related to the Internet of Things is effectively a political power play.
Experts say that Anthem's lack of encryption doesn't matter. Find out why they might be wrong in our legal analysis.
Many employees play fast and loose with corporate data policy. When shadow IT compromises data, how will you know?
Happy holidays from Enterprise Networking Planet!
Former Homeland Security chief Michael Chertoff broke down what it takes to manage data security risks.
Need to strengthen your information security efforts? Make space at the table for some outside collaborators and a few friendly hackers.
From touch-screen ballots to Internet elections, the idea of voting by computer is becoming less popular thanks to questions about the security of electronic voting systems.
What is the Internet of Things? What isn't it? With the help of insights from representatives at the Connected Cloud Summit, Joe Stanganelli explores.
Activists insist on the inherent superiority of open source, despite NSA backdoors, the fall of TrueCrypt, and the Heartbleed and Shellshock bugs.
As IoT took center stage at the Connected Cloud Summit in Boston, so too did discussions on the obstacles in the way of deployment.
More bandwidth! Speedier connections! Greater accessibility! Bigger data faster! These are the demands of tomorrow's IoT. Can they be met? If so, how?
Experts at Boston's Connected Cloud Summit argue that the cloud and the Internet of Things are necessarily intertwined.
Poor patching practices top our list of IT pet peeves, and for good reason. They lead to massive security risks.
End users are guilty of committing several IT pet peeves, but whose fault is that? Let's talk servers in sinks and temps with admin access.
What drives network engineers mad? Let's talk about bad cable management and worse GUIs.
What common mistakes make life harder in the IT trenches? Joe Stanganelli investigates.
Accessibility and cloud security concerns push development of on-premises cloud alternatives for the life sciences and genomics industries.
"Anti-cloud" appliances help the life sciences and genomics overcome compliance, cloud security, and data accessibility concerns.
A common Wi-Fi setting renders smartphones and other wireless devices vulnerable to exploits by specialist drones.
The Careto malware, a.k.a. The Mask, could have been a Duqu-like cyberweapon – but more sophisticated.
After judge declares a mistrial in Juniper/Palo Alto Networks patent trial, Joe Stanganelli examines what happened, and what happens next.