Three key moves for Linux this year will impact enterprise IT.
A look at how security is evolving around three key information technology developments.
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?
If the latest IT hiring projections from a prominent IT staffing specialist hold up, 2012 could get off to a bang. Make that a double-digit bang.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
Is a caching device right for your organization?
We explore what the Scala programming language can do for your organization with the language’s inventor.
In just three years, mobile workers will account for more than one-third of the global workforce.
Backing up everything isn't just wasteful and expensive -- data that "lives forever" exposes your enterprise to additional risks. We explain a smarter, safer, and less expensive approach to disaster recovery.
What can bridge the state of virtualization today and the unfettered reality we seek from the cloud? A true storage Hypervisor may hold the key.
Your cloud work doesn't stop once you go live. IT must vigilantly monitor its performance. We examine the options and impediments.
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?
Risk is not an exact science, but there are specific trends that should impact decision makers in the year to come.
Social media is a rich source of data. These three steps will help you make the most of it in your environment.
Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?
In 2012, businesses must align data security with customer value.
IT has used a mish mash of tools to manage VM. It's time to find something better.
Is Java dead? What's ahead for programming languages running on the Java Virtual Machines such as Scala, JRuby, and Clojure? We take a closer look.
During 2011, data centers became more virtualized in a migration to cloud-based architectures, which began to reveal previously-hidden problems with power. In 2012 this trend will continue and even accelerate, further elevating the importance of power for IT.
Tight budgets led to look closely at the cloud and encryption solutions. What will grab IT’s attention in 2012?