Enterprise


Lost in Space: Virtualized Backup Appliances

Confusion about the trends and changes in virtualized backup poses a real threat to IT managers. Fortunately, the future is less hazy than it seems.

The Hybrid Data Center: The Best of Virtual and Physical Computing Worlds

As more applications and data make their way to the cloud or are impacted by virtualization, data centers must adapt. The hybrid data center environment brings together the best of all worlds: cloud, virtualization, hardware, and co-lo.

What to Expect in Linux’s 21st Year

Three key moves for Linux this year will impact enterprise IT.

How Mobile Cloud Will Make Security Priority #1

A look at how security is evolving around three key information technology developments.

Mobile IT: A Look Back, A Look Ahead

Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?

Careers: IT Pros Testing the Waters

If the latest IT hiring projections from a prominent IT staffing specialist hold up, 2012 could get off to a bang. Make that a double-digit bang.

Will Advanced Persistent Threats Grow in 2012?

What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?



The Pros and Cons of Storage Caching Devices

Is a caching device right for your organization?

Q&A: An Introduction to the Scala Programming Language

We explore what the Scala programming language can do for your organization with the language’s inventor.

IDC Forecasts Strong Growth in Mobile Workforce

In just three years, mobile workers will account for more than one-third of the global workforce.

Get Smart about Archiving Backup Data

Backing up everything isn't just wasteful and expensive -- data that "lives forever" exposes your enterprise to additional risks. We explain a smarter, safer, and less expensive approach to disaster recovery.

From Clouds Comes Clarity in 2012

What can bridge the state of virtualization today and the unfettered reality we seek from the cloud? A true storage Hypervisor may hold the key.

Q&A: Cloud Migration and the Impact on Enterprise Monitoring

Your cloud work doesn't stop once you go live. IT must vigilantly monitor its performance. We examine the options and impediments.

Manage the Breach or the Breach Will Manage You

Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?

Risk Management Trends: 2011 and 2012

Risk is not an exact science, but there are specific trends that should impact decision makers in the year to come.

A 3-Step Plan for Social Media Data Integration

Social media is a rich source of data. These three steps will help you make the most of it in your environment.

Mobile Device Management in 2012: More Challenges, More Opportunities

Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?

Three Trends Driving Data Security Strategies in 2012

In 2012, businesses must align data security with customer value.

Q&A: Solving VM Management Challenges

IT has used a mish mash of tools to manage VM. It's time to find something better.

The State of Java/JVM in 2012

Is Java dead? What's ahead for programming languages running on the Java Virtual Machines such as Scala, JRuby, and Clojure? We take a closer look.