Features & News


Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

Can Machines Really Think?

The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.

Q&A: The Role of Social Networks in the Enterprise

Your employees are comfortable with social networks. How can those networks be turned to your business advantage?

SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

From Users to IT -- How Tableau Broadens Its Appeal

Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.

Why Climbing onto the Cloud Just Makes Sense

We examine the three characteristics any cloud infrastructure should have.

Reports of E-mail's Death Greatly Exaggerated

E-mail isn't dead. In fact, it's more alive and robust than it has ever been.



Q&A: Application Performance Management in Action (Case Study)

When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.

Best Practices for Creating an Effective Business Continuity Plan

Your business continuity plan must focus on three elements: people, infrastructure, and processes.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

How to Use the New Analytic Functions in SQL Server 2012

Learn how the new functions that perform calculations on ordered data sets in this excerpt from "Murach's SQL Server 2012 for Developers."

Survey Finds SharePoint Costs Higher Than Most Enterprises Estimate

Storage growth, lack of qualified management personnel often underestimated.

E-mail in the Cloud: What Can and Can't Be Moved

A well-architected modern messaging infrastructure will give your enterprise the agility to adapt quickly to changing application requirements without the constraints of cloud providers.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: The State of Data Security, Compliance, and Why Your Company May Be at Risk

A study of corporate e-mail and file transfer habits highlights security concerns.

Moving to the Cloud: Adoption, Impact, and What's Next

We examine the risks, challenges, and benefits of the cloud and where the technology is headed.

Q&A: Making the Move to HTML5

What are the benefits of HTML5 to your organization, and what skills will you need to make the transition a success?

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

The New Meaning of Software Quality

Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.

5 Tips for Switching Vendors

Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.