The ideal cloud provider should be an enabler, not an inhibitor. These five strategies will help you choose wisely.
Social media isn't just a marketing channel you bolt on to your current plans. You need to understand its true business-wide impact. How should your IT organization prepare to embrace social media over the next 12 months?
This month, Dell pulled the trigger on two significant acquisitions. What's behind Dell's acquisition moves, and why does at least one of them seem like a no-brainer?
These three rules of thumb will help you avoid the risk of keeping corporate data forever (and ever).
A certification program backed by CA Technologies may help supply IT’s next generation of trained professionals.
Four reasons why virtualization, not cloud computing, is changing the ground rules used to design traditional performance management systems and why your enterprise needs to consider new virtualization-aware approaches to performance management.
ODBC was a revolutionary technology 20 years ago. We look at its past and present, and suggest where it's headed.
Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.
Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.
How standards are driving organization value and how they benefit IT.
Companies expect to hire more IT workers this quarter, but not as aggressively as they did in the first quarter of the year, despite their optimism about growth.
First it was just "the cloud." Then came public clouds versus private clouds, and, of course, hybrid clouds. How is IT coping, and how do clouds fit in with other trends, such as the distributed data center?
Cloud computing isn't just "with us" -- it's here to stay, and IT spending on cloud services is expected to explode.
Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.
A new intelligent cloud network between data center and cloud is needed for efficient workload mobility.
IPsec is a secure, robust, and transparent network widely available to businesses with smaller overhead than you might think.
If IT professionals are a restaurant's chefs, then business development professionals are the rest of the staff -- those attracting guests, designing the menus, and managing the profits.
Is Big Data everything it’s cracked up to be or is the Big Data value proposition based on fears of an undiscovered insight in our data? Our storage analyst, Jon Toigo, looks at why Big Data isn’t for everyone.
How to overcome the three most common impediments to cloud project success.
Most IT organizations are only performing very basic monitoring on their servers. This new approach uses concepts we learned from the consumer gadget world.