When it comes to IT infrastructure, having a lot of muscle is good, but making intelligent use of all that muscle is even better. When it comes to internal clouds, a brain is key.
Just how much of a problem is the RSA key kerfuffle? Two research teams weigh in about encryption schemes.
Although relational databases will continue to be used for high-speed online transaction processing, conventional relational databases have clearly exhausted their usefulness for business analytics. What’s ahead for database technology?
Why backup software, as we know it, is dead and how virtualization is a game-changer.
Although Big Iron had a bad quarter, the long-term indicators -- bolstered by several mainframe product cycles' worth of data -- suggest System z is just tracking through its life cycle.
How can IT do more with less? By automating tasks. We explore the financial and productivity benefits, look at the downsides of automation, and examine how Big Data, virtualization, and cloud computing benefit from automation.
Cloud technology is rather easy to obtain. The right mix of technical skills mix to design and implement the technology is not.
One way to do more with less is to outsource tasks, including some components of your data center. What help and benefits can you expect from third-party providers, and what work should remain on premises?
A best-practices approach and advice for securing your Windows 7 environment.
Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.
New servers deliver real-time power data, but it’s difficult to uncover.
Storage clouds are rapidly losing what little buzz they once enjoyed in the industry. But other cloud-based services are beginning to appear.
HTML5 has emerged as the lingua franca for mobile application development, and companies of every size are racing to respond to the mobile revolution.
In the current economic climate, IT must align itself closer to the business needs of its users to achieve success. We explain how this IT/business alignment can occur as IT becomes a marketer of business services to its user base.
Over the years, IT has built up a collection of tapes, especially for backup. The problem is -- what's on all those tapes?
How B2B processes became so complex and why IT should consolidate them.
Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?
When business uncertainty is the "new normal," project management offices become critical in supporting strategic business priorities.
Social media, security, and customization all play a role in your choice of a cloud supplier.
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.