Features & News


Careers: Developers Embrace Moonlighting

More than half of all programmers moonlight -- as hobbyists, as contributors to open source projects, or, thanks to marketplaces like the AppStore, for fun and profit.

Will EC12 Be a Sales Behemoth?

Although the zEnterprise EC12 probably won't match the record-breaking performance of its predecessor, it should provide a big boost to Big Blue's bottom line.

5 Considerations for Your Move to the Cloud

Pay close attention to these five technology elements before moving to the cloud.

5 IT vs. Business Battlegrounds

The top five areas where department heads and IT staff commonly clash.

Q&A: Making File Transfers and Sharing More Secure

Is FTP losing out to file-sharing cloud services?

2012 IT Trends in Review; What to Expect in 2013

Which three trends had the biggest impact on IT in 2012, and which will affect IT the most in 2013?

Top 3 Trends in IT and Big Data: A Look Back, The Year Ahead

Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.



Four and Out

Emphasis on loyalty rather than satisfaction may help explain why, today, it is rare to see brand-name vendors vying for top honors in rig performance, cost-efficiency, or power efficiency bake-offs.

IBM Goes Big on Big Data at IOD

Not surprisingly, big-data-a-la-Big-Blue has a distinctly dollars-and-cents flavor to it.

Top 3 Trends in Developer Testing

How should developers cope with software eating the world?

Businesses Not Enthusiastic about Adopting Windows 8

Those with definite plans to upgrade is half the rate of those planning to move to Windows 7.

5 Questions to Ask When Shopping for Unified Storage

Five questions your business should ask of unified storage vendors so you don't have to compromise on performance, scalability, or cost efficiency.

Best Practices in System Copy: Automate in the Cloud

Cut the cost and improve the accuracy of SAP system copy chores.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

Can Machines Really Think?

The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.

SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

Q&A: The Role of Social Networks in the Enterprise

Your employees are comfortable with social networks. How can those networks be turned to your business advantage?

From Users to IT -- How Tableau Broadens Its Appeal

Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.

Why Climbing onto the Cloud Just Makes Sense

We examine the three characteristics any cloud infrastructure should have.