Is FTP losing out to file-sharing cloud services?
Which three trends had the biggest impact on IT in 2012, and which will affect IT the most in 2013?
Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.
Emphasis on loyalty rather than satisfaction may help explain why, today, it is rare to see brand-name vendors vying for top honors in rig performance, cost-efficiency, or power efficiency bake-offs.
Not surprisingly, big-data-a-la-Big-Blue has a distinctly dollars-and-cents flavor to it.
How should developers cope with software eating the world?
Cut the cost and improve the accuracy of SAP system copy chores.
Five questions your business should ask of unified storage vendors so you don't have to compromise on performance, scalability, or cost efficiency.
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
Your employees are comfortable with social networks. How can those networks be turned to your business advantage?
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.
We examine the three characteristics any cloud infrastructure should have.
E-mail isn't dead. In fact, it's more alive and robust than it has ever been.
When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.
Your business continuity plan must focus on three elements: people, infrastructure, and processes.
We examine policy considerations and how to manage security policy in a mixed environment.
A well-architected modern messaging infrastructure will give your enterprise the agility to adapt quickly to changing application requirements without the constraints of cloud providers.
Before you implement a next-generation firewall, follow these three tips to ensure project success.
A study of corporate e-mail and file transfer habits highlights security concerns.