Enterprise


A 3-Step, Least-Risk Approach to Securing Windows 7

A best-practices approach and advice for securing your Windows 7 environment.

Q&A: Managing Endpoints and Mobile Devices

Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.

Cloud Storage -- Here Today, Gone Tomorrow

Storage clouds are rapidly losing what little buzz they once enjoyed in the industry. But other cloud-based services are beginning to appear.

Q&A: Delivering Real-Time Power Data

New servers deliver real-time power data, but it’s difficult to uncover.

Why HTML5 is a Hit with Developers

HTML5 has emerged as the lingua franca for mobile application development, and companies of every size are racing to respond to the mobile revolution.

Next-Generation Business Service Management -- The Year Ahead

In the current economic climate, IT must align itself closer to the business needs of its users to achieve success. We explain how this IT/business alignment can occur as IT becomes a marketer of business services to its user base.

Q&A: Extracting the Mystery Out of Backup Tapes

Over the years, IT has built up a collection of tapes, especially for backup. The problem is -- what's on all those tapes?



9 Reasons to Consolidate Your B2B Systems

How B2B processes became so complex and why IT should consolidate them.

Cloud, Mobile, and the Fed: How the Government is Shaping Open Identity

Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?

5 Ways PMOs are Driving Strategic Growth

When business uncertainty is the "new normal," project management offices become critical in supporting strategic business priorities.

Q&A: Tackling Cloud Challenges

Social media, security, and customization all play a role in your choice of a cloud supplier.

4 Best Practices for Mitigating DDoS Effects

These four best practices will help government and political organizations mitigate the effects of DDoS attacks.

4 Considerations when Selecting a Cloud Computing Provider

Selecting a cloud provider can be tricky. Here are four things you need to investigate before making your selection.

Supporting BYOD with Strong Mobile Device Management Policies

How to make mobile device management a core part of your security management strategy.

The Rise of Virtualization Coexistence

Increasingly, Hyper-V and vSphere will operate in the same data center. What does that mean for IT?

Enterprises Look to 2012 for Return on Assets

With the limitations in IT budgets in 2012, the focus will be on investing in systems and services that optimize all the storage assets that enterprises already have rather than buying more capacity.

What to Expect from Managed Services in 2012

Outsourcing and managed services are constantly changing. We examine three ways the industry will adapt to technology and business changes this year.

Updated OpenSSL Libraries Patch Potential Information Disclosure, DoS Flaws

SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.

Lost in Space: Virtualized Backup Appliances

Confusion about the trends and changes in virtualized backup poses a real threat to IT managers. Fortunately, the future is less hazy than it seems.

The Hybrid Data Center: The Best of Virtual and Physical Computing Worlds

As more applications and data make their way to the cloud or are impacted by virtualization, data centers must adapt. The hybrid data center environment brings together the best of all worlds: cloud, virtualization, hardware, and co-lo.