NEWS
ECONOMY AND BUSINESS
Storage storage market decreased by 3.3%
According to IDC, in the first half of 2013, shipments of external disk storage systems (DSS) amounted to $14.3 million
PRODUCTS AND TECHNOLOGIES
Migration to 2048-bitSSL certificates
The risk of hackers hacking SSL certificates with keys less than 2048 bits in length grows along with the growth of computer computing capabilities
EVENTS
8 6TP-LINK: in Ukraine we expectan increase of 60%
TP-LINK has strengthened its position in the Ukrainian market of network equipment for SOHO and predicts an annual sales increase of 60–70%
COMPANIES AND MARKETS
business requires mobility
Technological factor
The results of the study in eight countries, including Russia, are in the blog of Chris Ozicki, senior director of the consulting division of Cisco Consulting Services byod
Generation Y speaks out against
It is characteristic that 47% of Russian employees aged 21 to 32 who took part in the survey claim that they would use personal mobile devices in the workplace, despite prohibiting corporate policies
TOPIC OF THE ISSUE
outsourcing
How much does IT service cost?
Today the market dictates making quick and effective decisions in business, without being scattered on secondary tasks. IT outsourcing, which relatively recently appeared on the Ukrainian market, quite successfully relieves customers of non-core assets, promoting the postulate “time is money”
CORPORATE SOLUTIONS
data security
Business risks associated with information leakage
Today, protecting your confidential data from leaks is an urgent task for any company, since modern information technologies make it very easy to process, copy and, unfortunately, lose any data. Let’s take a closer look at the business risks posed by information leaks
TECHNOLOGY AND BUSINESS
information security
Cyberthreat Analysts
Over the past few months, a number of companies have published their research on the growth of threats and tools of cyber attacks, the degree of readiness of companies to counter the latter, recommendations for improving data security, and much more. In this publication we present the most interesting studies from our point of view