Features & News


Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.

Trust in the Cloud is All About Transparency

Network-based application performance management may be just what service providers need to make the cloud ready for your mission-critical applications.

Citrix Enhances Cloud, Desktop Virtualization Portfolio

Company has aggressive plans for replacing traditional PC environments with virtual desktops and bridging enterprise data centers with the cloud.

IBM CEO Successor Named

Big Blue names Virginia Rometty to CEO position beginning January 1, succeeding Sam Palmisano.

Cisco and Citrix Join Forces for Desktop Virtualization

A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.

Information Workforce Approaching "Mobile Majority"

Almost half of U.S. information workers already split time between home, office, or other locations



Four Best Practices for Asset Management

How to think about scope, virtualization, mobility, compliance, and distributed workforce in tracking equipment and applications.

Security: IT Shops Unprepared to Police Social Media in the Enterprise

Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.

How to Evaluate a Cloud Provider’s Security Features

An introduction to the security requirements you should expect from a cloud service provider.

A Data Center without Hard Drives: Stanford's RAM Plan

Stanford researchers would like to replace hard drive storage and put everything in computer memory.

Q&A: How to Achieve Master Data Management Success

MDM and governance go hand in hand, but how do you know if your MDM approach is working, especially in light of Big Data and social media?

BI Unplugged -- Enabling Unprecedented Information Access

Mobility promises to enable unprecedented access to information -- in a highly-interactive, visually compelling context, to boot.

SyncSort Doubles-Down on High-Performance ETL

Performance is a major component of SyncSort's ETL 2.0 push.

How the iPad Experience Will Change the Face of BI

The iPad-like user experience promises to wholly transform the way information is presented and consumed in the enterprise. To their collective credit, many BI players get this. Why they get it is another matter.

Q&A: As Enterprises Mature, Data Governance Remains Challenging

As enterprise data management has matured, companies are beginning their data governance programs with a better understanding of what the term means, but plenty of questions and confusion remains.

What Do the Watson Computer and Network Security Have in Common?

Are you still writing rules for old firewalls? Dealing with ports and protocols is no longer sufficient. Next-generation firewalls drill into traffic to identify the applications traversing the network, and automation can help you build and manage the rules you need to exploit this technology.

Six Steps to Overcoming Resistance to ERP in Government

Organizational change management and benefits realization can help to reduce risk in ERP implementations. These steps can help your ERP project succeed.

Optimizing and Accelerating the Cloud

Does moving to the cloud mean you give up control of your application's performance?