Drowning in security data? Here’s how to make threat intel work for you

How does a company operationalize its risk and security programs? More specifically, with all of the talk about big data, how does a company operationalize its threat intelligence process? To read this article in full or to leave a comment, please click here (Insider Story) from InfoWorld Big Data http://ift.tt/1RjOIPW via IFTTT

Meet the real architects of tomorrow’s enterprise cloud

In the not-too-distant future, you’re going to hear a lot more about the CNCF (Cloud Native Computing Foundation). The brainchild of Craig McLuckie, product manager for Google Cloud Platform and founder of Google’s Kubernetes project, the CNCF will lead the development of a standardized, open source platform for managing next-gen enterprise clouds of Docker containers. Why… Continue reading Meet the real architects of tomorrow’s enterprise cloud

Nexus 5X Review: Google’s Second Best Flagship Device

 LG and Google have worked together again to bring you their latest Nexus incarnation. The Nexus 5X, one of two new flagship phones from Google, is being described fondly by the company as “the all-around champ.” I’m not sure what that means. Also, they’re saying things like the 5X is “capturing the soul of the… Continue reading Nexus 5X Review: Google’s Second Best Flagship Device

Nexus 6P Review: This Is The Android Device That You’ve Been Waiting For

 New phones are exciting. They look new, feel new, have new things and everyone loves new. I’m personally starting to feel phone fatigue, though. I love new technology, but I feel like the incremental updates that come along for Android phones and Apple phones are starting to get overwhelming. It used to be the case… Continue reading Nexus 6P Review: This Is The Android Device That You’ve Been Waiting For