Enterprise video is easier with Qumu Video Control Center version 7

  * NOTE: Qumu’s Enterprise Video platform is now called Qx. Please check out the latest information on Qumu Qx, the most extensible, end-to-end video platform. Thank you! Enterprise video has come a long way since Qumu first launched Video...


Read More

To BYOD or not to BYOD, that is the question

IT is befuddled. What is worse for the company, demotivated employees or increased security risks? Their employees want to use their own devices at work (70% of those under 30, 81% of those in college in a recent survey). And many companies are letting...


Read More

Is your enterprise video content secure?

In every large organization, IT spends a lot of time and money securing proprietary data and communications. And it's money well spent on most accounts. Video has quietly grown to become an significant part of the information stored and distributed within...


Read More

Infographic: Timing is everything for Public Relations professionals and their secrets

Public Relations professionals have to walk a fine line every day. Their job is to spread information, to get the word out - but not too soon. Leaking stories even a few hours early can wreak havoc - as Google found out. Top ten Public Relations news leaks...


Read More

Content-centric security would fix my library’s Kindle program

This is a confession. My library lends ebooks, which I download on my Kindle. I'm a slow reader, so inevitably I'm only halfway through my book when my three weeks are about to run out. So I turn off my Kindle's wifi. When I finish my book a few weeks...


Read More

Enterprises live on the edge – and so must their data

Ted Schadler of Forrester says "Innovation happens at the edge of the enterprise." So true, and so different than in the past. Not that long ago, the really important new things were created at the center of the enterprise. Think Bell Labs, IBM, the...


Read More

Keep an eye on your unintentional IT infrastructure

How much of your sensitive corporate data lives beyond your intentional IT infrastructure on your unmanaged, unintentional infrastructure? Your intentional IT infrastructure is the one you've invested in, built processes around, and have developed over...


Read More

To BYOD or not to BYOD, that is the question

IT is befuddled. What is worse for the company, demotivated employees or increased security risks? Their employees want to use their own devices at work (70% of those under 30, 81% of those in college in a recent survey). And many companies are letting...


Read More

Choosing between employee productivity and data security

What's more important to a business, employee productivity or data security? If you can answer this question, you're smarter than I am. Both are necessary. Without either, a business will eventually fail. Yet for information-intensive industries, having...


Read More

New study: lost smart phones mean compromised data

Symantec intentionally "lost" 50 smart phones in several urban centers to see what would happen.  The results are unnerving. Of the strangers that found the phones: 96% tried to access information on the lost phones 89% tried to access personal apps or...


Read More