From islands of storage to the consumerization of storage, IT storage administrators had their hands full this year. What challenges will they face in 2012?
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
As we close out 2011, infrastructure is no longer the bottleneck for IT. Applications are. How will cloud change -- and change IT -- in the year ahead?
This year IT had figured out what storage works best in what infrastructure. Thankfully, 2012 will be the year that innovation soars within the industry.
In 2011, enterprises acknowledged that cloud is in their future. What will 2012 bring to help companies feel more secure in adopting the cloud platform?
Disaster recovery is a growing part of IT's budget, but IT still needs quicker, more efficient, and more affordable backup and recovery solutions into one seamless process.
The virtualization momentum of 2011 will lead to some interesting trends in 2012, involving pricing, heterogeneity, and a company’s right to choose.
IT is demanding that the tools it uses provide higher levels of automation. What automation will we see in 2012?
Key events in cloud computing this year, and three predictions for its growth in 2012.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.
A tech-industry veteran looks back over the past year and predicts the big IT trends we can look forward to in 2012.
A look back at the leading mobility trends of the year, and three predictions for 2012.
What's it take to get hired in IT these days? Skills, for starters.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Windows on the Big Blue's hardware is almost here.
Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.