Apple Posted on October 15th, 2024 by Kirk McElhearn The Apple Pencil is a wonderful device if you want to draw on your iPad, take handwritten notes, and mark up documents. It’s even a great tool for editing text: it’s a lot easier to position the cursor and select text with a pencil than with […]
Which iPad is best for you in 2024? Comparison of Pro, Air, mini, 10th gen
Apple Posted on October 15th, 2024 by Kirk McElhearn and Joshua Long If you’re thinking about getting an iPad, the options may seem overwhelming. Do you need a Pro model? What’s the difference between the Air and the “10th generation” model? Or is a mini the best choice for you? In this article, we’ll help […]
Don’t Ignore What You Can Easily Control: Your IP Infrastructure
In today’s rapidly evolving digital landscape, managing IP infrastructure has become increasingly complex and critical for organizations of all sizes. As networks grow and diversify, encompassing on-premises, cloud, and hybrid environments, the challenges of efficiently managing DNS, DHCP, and IP address management services—collectively known as DDI—have multiplied. This blog post explores the key challenges in […]
The Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but it is a statement that bears repeating. Why? Back in 2016, the European Union introduced the General Data Protection Regulation (GDPR). This was, for many, the first time that data regulation became an issue, […]
Identity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally meet. This intersection is the browser. The Browser: The Intersection of Identity, Endpoint, and Network Security Why? If we expect identity security, it must be tied to users, their permissions, authorization, and authentication. If […]
Sidecarless Service Meshes: Are They Ready for Prime Time?
Service meshes have become a cornerstone in the architecture of modern microservices, providing a dedicated infrastructure layer to manage service-to-service communication. Traditionally, service meshes have relied on sidecar proxies to handle tasks such as load balancing, traffic routing, and security enforcement. However, the emergence of sidecarless service meshes has introduced a new paradigm, promising to […]
Digital Experience Platforms: Transforming Marketing in the 21st Century
In today’s fast-paced digital landscape, creating engaging and personalized customer experiences is paramount to business success. Enter digital experience platforms (DXPs)—powerful systems designed to revolutionize how companies interact with their audiences across various digital channels. Let’s dive into the fascinating world of DXPs and explore how they are reshaping marketing strategies. The Genesis of Digital […]
“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about AI instead? That may be your response when you hear a security analyst talk about phishing and phishing prevention, but those assumptions couldn’t be further from the truth. Phishing continues to be one of […]
Backup to the Future! – Gigaom
“I finally invented something that works!” This iconic quote from Back to the Future perfectly encapsulates the transformative journey of cloud-native data protection. As organizations increasingly migrate to the cloud, the landscape of data protection is evolving at a breakneck pace, much like Marty McFly’s adventures through time. Let’s take a closer look at the […]