From islands of storage to the consumerization of storage, IT storage administrators had their hands full this year. What challenges will they face in 2012?
Tight budgets led to look closely at the cloud and encryption solutions. What will grab IT’s attention in 2012?
For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.
As we close out 2011, infrastructure is no longer the bottleneck for IT. Applications are. How will cloud change -- and change IT -- in the year ahead?
This year IT had figured out what storage works best in what infrastructure. Thankfully, 2012 will be the year that innovation soars within the industry.
The virtualization momentum of 2011 will lead to some interesting trends in 2012, involving pricing, heterogeneity, and a company’s right to choose.
In 2011, enterprises acknowledged that cloud is in their future. What will 2012 bring to help companies feel more secure in adopting the cloud platform?
Disaster recovery is a growing part of IT's budget, but IT still needs quicker, more efficient, and more affordable backup and recovery solutions into one seamless process.
IT is demanding that the tools it uses provide higher levels of automation. What automation will we see in 2012?
Key events in cloud computing this year, and three predictions for its growth in 2012.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.
A tech-industry veteran looks back over the past year and predicts the big IT trends we can look forward to in 2012.
What's it take to get hired in IT these days? Skills, for starters.
A look back at the leading mobility trends of the year, and three predictions for 2012.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Windows on the Big Blue's hardware is almost here.
Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.