In the current economic climate, IT must align itself closer to the business needs of its users to achieve success. We explain how this IT/business alignment can occur as IT becomes a marketer of business services to its user base.
Over the years, IT has built up a collection of tapes, especially for backup. The problem is -- what's on all those tapes?
How B2B processes became so complex and why IT should consolidate them.
Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?
Social media, security, and customization all play a role in your choice of a cloud supplier.
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
When business uncertainty is the "new normal," project management offices become critical in supporting strategic business priorities.
Selecting a cloud provider can be tricky. Here are four things you need to investigate before making your selection.
How to make mobile device management a core part of your security management strategy.
Increasingly, Hyper-V and vSphere will operate in the same data center. What does that mean for IT?
With the limitations in IT budgets in 2012, the focus will be on investing in systems and services that optimize all the storage assets that enterprises already have rather than buying more capacity.
Outsourcing and managed services are constantly changing. We examine three ways the industry will adapt to technology and business changes this year.
SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.
Confusion about the trends and changes in virtualized backup poses a real threat to IT managers. Fortunately, the future is less hazy than it seems.
As more applications and data make their way to the cloud or are impacted by virtualization, data centers must adapt. The hybrid data center environment brings together the best of all worlds: cloud, virtualization, hardware, and co-lo.
Three key moves for Linux this year will impact enterprise IT.
A look at how security is evolving around three key information technology developments.
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?
We explore what the Scala programming language can do for your organization with the language’s inventor.
In just three years, mobile workers will account for more than one-third of the global workforce.