After all, if your company doesn't know what data center components waste energy, how can you change it?
Social technologies are now an essential tool for bolstering internal IT services and communications. We explain how to get started with this powerful, new approach to IT collaboration and support.
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.
This year could be a tipping point for enterprise mobile applications.
The tools for building a strategic storage infrastructure are available to intelligent consumers.
DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
With contract and services work all the rage, recruiting, retaining, or promoting full-time employees isn’t a high priority for most IT organizations at this time.
System z is back! Sales surged by almost 70 percent during z Enterprise's first quarter of availability, while MIPS capacity increased by almost 60 percent.
Knowing common SOA pitfalls is the first step to avoiding them. The authors of "100 SOA Questions Asked and Answered" point out how SOA governance teams and application teams can avoid these traps.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.
Realizing the potential benefits for large-scale service deployments presents difficult challenges. We discuss these opportunities and challenges and recommend solutions.
Are most of the announcements around hot storage innovations lately anything beyond hot air? Our storage analyst, Jon Toigo, finds one bright spot.
India faces pressure from both Eastern European outsourcing destinations and a new crop of scrappy Asia-Pacific upstarts.
Going Agile shifts the focus of gathering application requirements from detailed specifications to user stories, and that's the biggest obstacle to success, according to a recent survey of companies making the leap.
With the rising costs of energy and increasing pressure on organizations to be more "green," implementing a DCIM and/or DPO solution is inevitable.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.
Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?
This is the year when enterprises will evaluate SaaS solutions for cloud-based IT management.