How should developers cope with software eating the world?
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
Your employees are comfortable with social networks. How can those networks be turned to your business advantage?
A study of corporate e-mail and file transfer habits highlights security concerns.
A well-architected modern messaging infrastructure will give your enterprise the agility to adapt quickly to changing application requirements without the constraints of cloud providers.
We examine the risks, challenges, and benefits of the cloud and where the technology is headed.
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.
"Turn off computers at night" is a simplistic solution to saving energy. For a more efficient approach to lowering your energy costs, consider the benefits of load-adaptive computing technology.
We examine the benefits of I/O virtualization and offer best practices to achieve high-performance I/O.
What you need to know about Hadoop benefits, scalability, and best practices.
The public cloud is still the Wild, Wild West, but shunning the cloud until things become a bit more stable and predictable may not be the smart play.
Social content is rich with information, but integrating it with other enterprise data can leave it isolated and unused. We explore how to wisely integrate the two.
The movie "2001: A Space Odyssey" was released in 1968. Well over 40 years later, we still have a lot of work to do on the space flight front, but natural language processing is almost there.
The evolution of IT automation, how the technology has changed, where it is today, and where it's headed.
SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.
From BYOD to social media, the trends that are keeping security administrators on their toes.
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.