Author Archives: Nathan Eddy

Nathan Eddy
Author: Nathan Eddy
eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.
Nathan Eddy is a contributor to eWeek and TechWeekEurope, covering cloud and BYOD

You like this stories?
Stay connected with us: Join our newsletters.

Nathan Eddy
secure smartphone chain lock unlock
On by Nathan Eddy 0

BrightCloud IP Reputation Service is a real-time threat intelligence service that helps organisations identify malicious IPs in network traffic

Read more

Apple MacBook Pro Haswell (6)
On by Nathan Eddy 0

Apple and Chrome OS lead sales drive, with Chrome OS unit sales increasing 37 percent over 2013 and Mac OS-based products up 14 percent

Read more

Dell logo
On by Nathan Eddy 0

Dell Software's AppAssure 5.4 simplifies the user experience and improves platform support

Read more

Elephant fire spark apache hadoop big data © HeartBeat Shutterstock
On by Nathan Eddy 0

The company is also planning a QuickApps visual editor for users who want to create their own data-analytics applications

Read more

Kindle_Fire_HD
On by Nathan Eddy 0

Apple and Amazon lead the increasingly crowded and maturing US tablet market, according to Kantar Worldpanel ComTech

Read more

BigData
On by Nathan Eddy 0

Plextor's M6M mSATA and M6S SSDs support full-disk encryption using the 256-bit AES standard

Read more

HPC
On by Nathan Eddy 0

After a record year in 2012, the high-performance computing (HPC) market experienced a tougher year in 2013

Read more

© Monika Wisniewska - Fotolia.com
On by Nathan Eddy 0

Information technology is transforming the treatment of sleep disorders, resulting in a boom in related devices, according to Frost & Sullivan

Read more

Internet of things, world electronics fibre network connection © asharkyu Shutterstock
On by Nathan Eddy 0

Unified communications specialist Everbridge has added business continuity offerings to its lineup with the Vocal acquisition

Read more

Security © m00osfoto Shutterstock 2012
On by Nathan Eddy 0

Organisations ramping up one-time passwords to combat security breaches need to pay closer attention to how they implement those systems, the Ponemon study found

Read more