Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Network-based application performance management may be just what service providers need to make the cloud ready for your mission-critical applications.
Company has aggressive plans for replacing traditional PC environments with virtual desktops and bridging enterprise data centers with the cloud.
Big Blue names Virginia Rometty to CEO position beginning January 1, succeeding Sam Palmisano.
A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.
Almost half of U.S. information workers already split time between home, office, or other locations
How to think about scope, virtualization, mobility, compliance, and distributed workforce in tracking equipment and applications.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
An introduction to the security requirements you should expect from a cloud service provider.
Stanford researchers would like to replace hard drive storage and put everything in computer memory.
MDM and governance go hand in hand, but how do you know if your MDM approach is working, especially in light of Big Data and social media?
Mobility promises to enable unprecedented access to information -- in a highly-interactive, visually compelling context, to boot.
Performance is a major component of SyncSort's ETL 2.0 push.
The iPad-like user experience promises to wholly transform the way information is presented and consumed in the enterprise. To their collective credit, many BI players get this. Why they get it is another matter.
As enterprise data management has matured, companies are beginning their data governance programs with a better understanding of what the term means, but plenty of questions and confusion remains.
Are you still writing rules for old firewalls? Dealing with ports and protocols is no longer sufficient. Next-generation firewalls drill into traffic to identify the applications traversing the network, and automation can help you build and manage the rules you need to exploit this technology.
Organizational change management and benefits realization can help to reduce risk in ERP implementations. These steps can help your ERP project succeed.
Does moving to the cloud mean you give up control of your application's performance?