Features & News


Commentary: Survey of Agile in the Real World Confounds

A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.

Careers: It's a Cruel Summer for IT Job Seekers

U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.

Microsoft Offers Sneak Peek at Updated Office 365

Cloud-based application supports features of Office 2013.

Q&A: Akka 101

What makes Akka so valuable for building today’s distributed applications?

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

Improve New App Implementation Using Your Old Environment

By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.



IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

Yahoo Confirms E-Mail User Names, Passwords Exposed

Hack reveals lack of basic security standards.

Tape's Diamond Jubilee

In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.

Windows 8, Server 2012 Due in October

RTM in August foretells Fall availability of two key Microsoft products.

Behind IBM's Bifurcated Hybrid Computing Strategy

For most organizations, choosing between Big Blue's two hybrid computing visions is simple, but what about shops that need both? That's where it gets tricky.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

Q&A: The Evolution of Printing in a Mobile World

Think printing is just for creating hard-copy reports? Think again.

The New VDI-in-a-Box: Simple to Pilot, Seamless to Scale

The market has shown that desktop virtualization needed to be simplified. With the evolution of new VDI-in-a-Box solutions, it will be.

Q&A: What CIOs Must Understand about Public and Private Clouds and PaaS

What should a CIO consider when moving to Paas? What criteria should the CIO use, and what misconceptions about the cloud must be overcome?

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Q&A: IT's Evolving Big Data Landscape

As the buzz over big data grows, what's changed in the last year? How has machine-generated data changed the way IT tackles big data?

5 Projects for Purging Data and Managing Long-Term Liability

These steps will help you begin building and executing a defensible deletion strategy.