A study of corporate e-mail and file transfer habits highlights security concerns.
We examine the risks, challenges, and benefits of the cloud and where the technology is headed.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.
"Turn off computers at night" is a simplistic solution to saving energy. For a more efficient approach to lowering your energy costs, consider the benefits of load-adaptive computing technology.
What you need to know about Hadoop benefits, scalability, and best practices.
We examine the benefits of I/O virtualization and offer best practices to achieve high-performance I/O.
The public cloud is still the Wild, Wild West, but shunning the cloud until things become a bit more stable and predictable may not be the smart play.
Social content is rich with information, but integrating it with other enterprise data can leave it isolated and unused. We explore how to wisely integrate the two.
The movie "2001: A Space Odyssey" was released in 1968. Well over 40 years later, we still have a lot of work to do on the space flight front, but natural language processing is almost there.
The evolution of IT automation, how the technology has changed, where it is today, and where it's headed.
SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.
From BYOD to social media, the trends that are keeping security administrators on their toes.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.
U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.
VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.
What makes Akka so valuable for building today’s distributed applications?
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.