Are most of the announcements around hot storage innovations lately anything beyond hot air? Our storage analyst, Jon Toigo, finds one bright spot.
Service provisioning using cloud computing poses challenges for the data center. What’s needed is a multi-core, heterogeneous architecture.
When it comes to development, smaller truly is faster.
We outline seven steps that help you address the people aspect of data security.
Tips to identify and prevent the top headaches Java developers face.
India faces pressure from both Eastern European outsourcing destinations and a new crop of scrappy Asia-Pacific upstarts.
Going Agile shifts the focus of gathering application requirements from detailed specifications to user stories, and that's the biggest obstacle to success, according to a recent survey of companies making the leap.
With the rising costs of energy and increasing pressure on organizations to be more "green," implementing a DCIM and/or DPO solution is inevitable.
Contract lifecycle management solutions can provide greater insight and control over contractual obligations; helping companies to manage risks and increase profits.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.
What’s the most reliable server operating platform of them all? If you answered z/OS, you’re right. The rest of the tally might surprise you, however.
Best practices for protecting your mobile and enterprise assets.
Enterprises are striving to increase server virtualization this year. The maturity of server virtualization will help drive the planning of your network strategy; another is desktop virtualization.
Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?
These strategies will help you manage your growing storage needs in 2011.
This is the year when enterprises will evaluate SaaS solutions for cloud-based IT management.
How to improve security for mobile users in light of new, complex technologies such as cloud computing.
Understanding what you are paying for helps you uncover hidden costs and measure ROI.
According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.
From automation to the cloud, IT leadership to self-awareness, these trends may dominate IT this year. Are you prepared?