Trends


Survey Says: Business as Usual for Big Iron

Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.

How Load-Adaptive Computing Optimizes Energy Use to Improve Your Bottom Line

"Turn off computers at night" is a simplistic solution to saving energy. For a more efficient approach to lowering your energy costs, consider the benefits of load-adaptive computing technology.

Q&A: I/O Virtualization and Best Practices

We examine the benefits of I/O virtualization and offer best practices to achieve high-performance I/O.

Hadoop, The Cloud, and Big Data

What you need to know about Hadoop benefits, scalability, and best practices.

Healthy Fear of the Cloud is Good, But Absolute Terror is Shortsighted

The public cloud is still the Wild, Wild West, but shunning the cloud until things become a bit more stable and predictable may not be the smart play.

Q&A: Integrating SharePoint with Social Content

Social content is rich with information, but integrating it with other enterprise data can leave it isolated and unused. We explore how to wisely integrate the two.

Our Quest to Chat with HAL

The movie "2001: A Space Odyssey" was released in 1968. Well over 40 years later, we still have a lot of work to do on the space flight front, but natural language processing is almost there.



Q&A: IT Automation's New Directions

The evolution of IT automation, how the technology has changed, where it is today, and where it's headed.

SSD: Coming with a Vengeance

SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

How Remote Infrastructure Management Can Improve Processes and Increase Efficiency

These 6 action steps will help you get the most from outsourcing your remote infrastructure management.

Commentary: Survey of Agile in the Real World Confounds

A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.

Careers: It's a Cruel Summer for IT Job Seekers

U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.

Q&A: Akka 101

What makes Akka so valuable for building today’s distributed applications?

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

Tape's Diamond Jubilee

In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.