Sigma Solutions Blog


Will Intel’s New ‘Skylake’ Processors Revitalize PCs?

Posted by Michael Renner on Sep 25, 2015 5:26:46 PM

For several years, industry analysts have been heralding the arrival of the post-PC era. Sales of desktop and laptop computers have been in the doldrums for years as more users rely primarily upon smaller, more mobile devices. And now the launch of Intel’s new 6th Generation Intel Core processor family is expected to further diversify end-users’ tech choices.

Read More

What to Do when Facing an Oracle License Review

Posted by BMcCandless on Sep 24, 2015 6:04:16 PM

Organizations that use Oracle software are often asked to show compliance with Oracle license requirements. This process, known as an Oracle license review, is designed to confirm how many and what type of Oracle products are licensed and reconcile the organization’s Oracle software usage with the license entitlements. Organizations may be selected for license review by Oracle’s License Management Services (LMS) at three- or four-year intervals, or if they suspect noncompliance.

Read More

How to Improve IT Security with Threat Intelligence

Posted by BMcCandless on Sep 17, 2015 12:05:51 PM

In my last post I discussed how threat intelligence is emerging as a central element of an enterprise security strategy. Threat intelligence solutions collect data about security threats and provide sophisticated tools to help organizations assess the risk level of each threat and prioritize efforts to address vulnerabilities.

Read More

Topics: Security

How to Improve Productivity by Improving the User Experience

Posted by CReed on Sep 16, 2015 12:53:43 PM

While many organizations view technology as a mechanism for improving operational efficiency and supporting business goals, not enough emphasis is placed on the user experience. Whether they’re working in the office or remotely, employees expect to be able to seamlessly transition between mobile and desktop devices with a consistent user environment and no loss of performance, functionality, security or control.

Read More

Topics: Virtualization

Network Virtualization vs. Software-Defined Networking: What’s the Difference?

Posted by Michael Renner on Sep 16, 2015 12:41:33 PM

Software-defined networking (SDN) has been generating a lot of buzz in the IT industry. As organizations virtualize more and more workloads, they are finding that manual network configuration processes create bottlenecks that impede service delivery. The SDN model promises to improve IT agility by automating the provisioning of network resources and enabling IT to centrally manage the delivery of applications and services across the network.

Read More

Topics: Virtualization

Why Outsourcing CDN Services Makes Sense

Posted by BGrassmuck on Aug 20, 2015 9:30:00 AM

In a previous post, we discussed how organizations are responding to increasing user demand for content, especially video, by deploying content delivery networks (CDNs). A CDN is an integrated system of strategically located servers that dynamically delivers digital content based on the geographic origin of the request.

Read More

Why Threat Intelligence Should Be at the Core of your Security Strategy

Posted by BMcCandless on Aug 19, 2015 8:30:00 AM

Organizations are transmitting and storing unprecedented amounts of data. This data is constantly travelling through wired and wireless networks, desktop and mobile devices, and cloud-based services. As organizations leverage an ever-expanding technological toolshed to become more productive, flexible and agile, they’ve also created a virtual smorgasbord for cybercriminals.

Read More

Topics: Security

How Content Delivery Networks Satisfy Content Cravings

Posted by BGrassmuck on Aug 17, 2015 1:15:22 PM

Consumers crave digital content, particularly video, on both desktop and mobile devices. According to Juniper Research, video content represents approximately 60 percent of global IP traffic. From live event streams and on-demand HD video and audio to social media applications and gaming channels, digital content consumption is growing exponentially on a global scale.

Read More

Web Application Firewalls Help Protect against App Attacks

Posted by BMcCandless on Aug 12, 2015 9:16:57 PM

Hackers are no longer merely just for open ports on network firewalls. They have shifted their tactics to targeting applications directly. Security experts say 80 percent of attacks today happen at the application layer, thus evading traditional methods of perimeter and core network protection.

Read More

What You Need to Know Before Moving Applications to the Cloud

Posted by BGrassmuck on Aug 10, 2015 1:39:23 PM

In a previous post, we discussed how a cloud assessment, which involves evaluating your existing infrastructure, applications and services in terms of both technology and business value, can make your cloud migration seamless and efficient. Traditionally, most organizations have been drawn to the cloud because of the cost savings. Instead of installing, owning and maintaining technology, you use a service provider’s technology, scale up or down as needed, and pay as you go. But the benefits extend far beyond dollars and cents.

Read More

Topics: Cloud