Trends


Storage Progress in 2011 and 3 Predictions for 2012

This year IT had figured out what storage works best in what infrastructure. Thankfully, 2012 will be the year that innovation soars within the industry.

The Year Past, The Year Ahead in Virtualization

The virtualization momentum of 2011 will lead to some interesting trends in 2012, involving pricing, heterogeneity, and a company’s right to choose.

Cloud Computing: We’ve Only Just Begun

In 2011, enterprises acknowledged that cloud is in their future. What will 2012 bring to help companies feel more secure in adopting the cloud platform?

Disaster Recovery Driven By Tight Budgets, New Technology

Disaster recovery is a growing part of IT's budget, but IT still needs quicker, more efficient, and more affordable backup and recovery solutions into one seamless process.

Systems Management Frustrations in 2011 Will Lead to 2012 Improvements

IT is demanding that the tools it uses provide higher levels of automation. What automation will we see in 2012?

The Year Past, The Year Ahead in the Cloud

Key events in cloud computing this year, and three predictions for its growth in 2012.

Q&A: Best Practices for z/OS Security

Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.



Random Musings from a CTO: 2011 Trends, 2012 Predictions

A tech-industry veteran looks back over the past year and predicts the big IT trends we can look forward to in 2012.

Careers: What IT Skills are in Greatest Demand

What's it take to get hired in IT these days? Skills, for starters.

Mobility: The Year Past, The Year Ahead

A look back at the leading mobility trends of the year, and three predictions for 2012.

Complex Attacks Bypassing Enterprise Safeguards

Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.

Windows on Mainframes Due December 16

Windows on the Big Blue's hardware is almost here.

E-mail Migration: Plans, Risks, Strategies Revealed in Report

Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

IBM Platform Decisions HPC

With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.

Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.

Cisco and Citrix Join Forces for Desktop Virtualization

A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.

Security: IT Shops Unprepared to Police Social Media in the Enterprise

Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.

Information Workforce Approaching "Mobile Majority"

Almost half of U.S. information workers already split time between home, office, or other locations

A Tea Party in Storage?

The V-party may be a grassroots movement energized by widespread anger against the predatory behavior of storage and system vendors, but it seems to have followed the pattern of many movements -- technological and political.