Enterprise video is easier with Qumu Video Control Center version 7
November 20, 2013
* NOTE: Qumu’s Enterprise Video platform is now called Qx. Please check out the latest information on Qumu Qx, the most extensible, end-to-end video platform. Thank you! Enterprise video has come a long way since Qumu first launched Video...
To BYOD or not to BYOD, that is the question
September 10, 2013
IT is befuddled. What is worse for the company, demotivated employees or increased security risks? Their employees want to use their own devices at work (70% of those under 30, 81% of those in college in a recent survey). And many companies are letting...
Is your enterprise video content secure?
September 4, 2013
In every large organization, IT spends a lot of time and money securing proprietary data and communications. And it's money well spent on most accounts. Video has quietly grown to become an significant part of the information stored and distributed within...
Infographic: Timing is everything for Public Relations professionals and their secrets
March 14, 2013
Public Relations professionals have to walk a fine line every day. Their job is to spread information, to get the word out - but not too soon. Leaking stories even a few hours early can wreak havoc - as Google found out. Top ten Public Relations news leaks...
Content-centric security would fix my library’s Kindle program
August 30, 2012
This is a confession. My library lends ebooks, which I download on my Kindle. I'm a slow reader, so inevitably I'm only halfway through my book when my three weeks are about to run out. So I turn off my Kindle's wifi. When I finish my book a few weeks...
Enterprises live on the edge – and so must their data
July 25, 2012
Ted Schadler of Forrester says "Innovation happens at the edge of the enterprise." So true, and so different than in the past. Not that long ago, the really important new things were created at the center of the enterprise. Think Bell Labs, IBM, the...
Keep an eye on your unintentional IT infrastructure
July 11, 2012
How much of your sensitive corporate data lives beyond your intentional IT infrastructure on your unmanaged, unintentional infrastructure? Your intentional IT infrastructure is the one you've invested in, built processes around, and have developed over...
To BYOD or not to BYOD, that is the question
June 28, 2012
IT is befuddled. What is worse for the company, demotivated employees or increased security risks? Their employees want to use their own devices at work (70% of those under 30, 81% of those in college in a recent survey). And many companies are letting...
Choosing between employee productivity and data security
May 21, 2012
What's more important to a business, employee productivity or data security? If you can answer this question, you're smarter than I am. Both are necessary. Without either, a business will eventually fail. Yet for information-intensive industries, having...
New study: lost smart phones mean compromised data
March 15, 2012
Symantec intentionally "lost" 50 smart phones in several urban centers to see what would happen. The results are unnerving. Of the strangers that found the phones: 96% tried to access information on the lost phones 89% tried to access personal apps or...