GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

All Posts

Tech News Recap for the Week of 6/27/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 6/27/2016!

Top cloud providers made $11 billion in 2015. Could Brexit be trouble for the cloud computing market? Cloud computing is slowing energy demands. Cisco is acquiring API-based app security startup CloudLock for $293m. HPE wins a lawsuit over Oracle, Google steps up the smartphone wars, NASCAR is using Microsoft applications to monitor live data from the track, and more top news from this week you may have missed!

If you want to stay up-to-date on the latest tech news throughout the week, follow us on Twitter at @GreenPagesIT

Tech News Recap


Register for upcoming webinar, " The Hyper-Converged Landscape: What's New, What's Hot, and What's Possible


By Ben Stephenson, Emerging Media Specialist



Related Posts

CIO Fireside Chat Recap: Responding to a Ransomware Attack

By Mario Brum, VP of Practice Area and Technical Advisory Services, GreenPages   Mario Brum hosted our inaugural CIO Fireside Chat, an online event for business executives and IT experts about the latest tech topics and trends. In this blog post, Mario recaps the discussion on responding to ransomware attacks and shares data from a real-time poll showing how top cybersecurity leaders responded to this controversial topic. 

How Microsoft Purview Simplifies and Secures Your Organization's Data

By David Barter, GreenPages Microsoft Technologies Practice Lead Managing disparate data sources is a challenge for today's hybrid workforces. But Microsoft Purview can simplify your data security, governance, and compliance.

Why MFA Is a Must-have Cybersecurity for Business

By Jay Martin, GreenPages Security Practice Lead Multifactor authentication can protect today's hybrid workforces from cyberattacks designed to steal, destroy, or ransom a company's extremely valuable data.