Features & News


More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

How to Use the New Analytic Functions in SQL Server 2012

Learn how the new functions that perform calculations on ordered data sets in this excerpt from "Murach's SQL Server 2012 for Developers."

Survey Finds SharePoint Costs Higher Than Most Enterprises Estimate

Storage growth, lack of qualified management personnel often underestimated.

E-mail in the Cloud: What Can and Can't Be Moved

A well-architected modern messaging infrastructure will give your enterprise the agility to adapt quickly to changing application requirements without the constraints of cloud providers.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: The State of Data Security, Compliance, and Why Your Company May Be at Risk

A study of corporate e-mail and file transfer habits highlights security concerns.

Moving to the Cloud: Adoption, Impact, and What's Next

We examine the risks, challenges, and benefits of the cloud and where the technology is headed.



Q&A: Making the Move to HTML5

What are the benefits of HTML5 to your organization, and what skills will you need to make the transition a success?

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

The New Meaning of Software Quality

Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.

5 Tips for Switching Vendors

Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.

Q&A: Moving Between Cloud Technologies

Moving from private to public or hybrid clouds can be risky. These best practices can help you avoid common traps.

Q&A: Managing Cloud Downtime

The cloud offers enterprises several economic advantages, but downtime can seriously affect your bottom line. We examine how to prepare for -- and work around -- such service interruptions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Survey Says: Business as Usual for Big Iron

Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.

IBM and AT&T Planning Enterprise Cloud Service for 2013

Service will combine compute and storage infrastructure, new VPN technology.

Microsoft Licensing Price Hikes

Enterprises left to determine if discount drops at license renewal for the Platform EA bundle.

Users vs IT -- Is IT Losing the Battle?

In the age of mobile computing and bring-your-own-device, can IT ever regain control of “rogue” users?

Windows Server 2012 Delivers Data Virtualization in Delightful Ways

From Live Migration to server core switching, we examine the key virtualization features of Windows Server 2012.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.