RDBMS query languages

Security risk management News

View All News

Security risk management Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Not playing games: The GPU vs. CPU question gets more interesting

    Putting thousands of cores to work makes perfect sense when you're powering a video game. But graphics processing units, or GPUs, can't serve much practical purpose in a corporate data center, can they?

    The GPU vs. CPU discussion isn't as odd as it sounds. In fact, a more broad application of GPUs in the data center can provide the processing punch that CPUs simply cannot. With tasks where data can be processed in parallel rather than in sequence, GPUs might be a particularly valuable tool. The cover story in this issue of Modern Infrastructure looks at scenarios where simultaneous processing can be just what's needed, such as with machine learning and artificial intelligence.

    This month's Modern Infrastructure also looks at how data can be protected while in the data center. Full encryption is seemingly a perfect defense for data theft. But that's a difficult -- and, to some, an unrealistic-- road to travel. We look at how an IT team can better safeguard its data, factoring in costs, the tools available and the tradeoffs involved in hack-proofing an organization's data.

    And what about the vulnerabilities that arise from within your business? We examine the risk of data loss posed by the shadow IT phenomenon, an ongoing and ever-changing challenge.

    It's clear that data is an increasingly valuable resource. Processing it and keeping it safe -- whether that entails taking up the question of GPU vs. CPU for certain workloads or upgrading encryption -- need to be priorities for IT professionals in organizations of all sizes and types.

     Continue Reading

  • Corporate network: Assumptions vs. reality

    Security expert Georgia Weidman explains the assumptions versus the realities of corporate network security, and highlights the biggest risk factors facing modern enterprises. Continue Reading

  • How to pick between VDI vs. DaaS for desktop virtualization

    IT admins have a big decision in picking between VDI and DaaS. For most organizations it comes down to ease of management, level of control, performance needs, security and costs. Continue Reading

View All Evaluate

Manage Security risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close