Can the gulf between development and operations be bridged?
Moving to the clouds doesn’t mean resources must be let go.
When you're shopping for backup appliances, keep these four scalability parameters in mind.
The 4 Ps for staying informed when disaster strikes.
Windows on the Big Blue's hardware is almost here.
IT needs to supply the best customer experience while maintaining service-level agreements. We explain how VDI makes monitoring the end-user experience tougher and the best practices that will help you overcome these challenges.
Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.
With the cloud, it's backup without the actual backup.
What you need to know about moving to virtual desktops.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Network-based application performance management may be just what service providers need to make the cloud ready for your mission-critical applications.
What can you do to ensure that your cloud computing plan is ready to go and will get the job done? These 10 steps will help.
With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
How to think about scope, virtualization, mobility, compliance, and distributed workforce in tracking equipment and applications.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.
Almost half of U.S. information workers already split time between home, office, or other locations
An introduction to the security requirements you should expect from a cloud service provider.
Are you still writing rules for old firewalls? Dealing with ports and protocols is no longer sufficient. Next-generation firewalls drill into traffic to identify the applications traversing the network, and automation can help you build and manage the rules you need to exploit this technology.