A remodel of a data center created unique challenges. We examine the success factors of a project at the University of Nevada Las Vegas.
The performance of IBM's Power Systems line was a bright spot in an otherwise turbulent server market, but the prospects for the Unix market as a whole look as bleak as ever.
Cloud technology is rather easy to obtain. The right mix of technical skills mix to design and implement the technology is not.
One way to do more with less is to outsource tasks, including some components of your data center. What help and benefits can you expect from third-party providers, and what work should remain on premises?
Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.
Storage clouds are rapidly losing what little buzz they once enjoyed in the industry. But other cloud-based services are beginning to appear.
Increasingly, Hyper-V and vSphere will operate in the same data center. What does that mean for IT?
With the limitations in IT budgets in 2012, the focus will be on investing in systems and services that optimize all the storage assets that enterprises already have rather than buying more capacity.
Outsourcing and managed services are constantly changing. We examine three ways the industry will adapt to technology and business changes this year.
Three key moves for Linux this year will impact enterprise IT.
A look at how security is evolving around three key information technology developments.
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?
If the latest IT hiring projections from a prominent IT staffing specialist hold up, 2012 could get off to a bang. Make that a double-digit bang.
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
In just three years, mobile workers will account for more than one-third of the global workforce.
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?
Risk is not an exact science, but there are specific trends that should impact decision makers in the year to come.
Social media is a rich source of data. These three steps will help you make the most of it in your environment.
In 2012, businesses must align data security with customer value.
Is Java dead? What's ahead for programming languages running on the Java Virtual Machines such as Scala, JRuby, and Clojure? We take a closer look.