With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
Almost half of U.S. information workers already split time between home, office, or other locations
The V-party may be a grassroots movement energized by widespread anger against the predatory behavior of storage and system vendors, but it seems to have followed the pattern of many movements -- technological and political.
New workloads account for almost one-third of MIPS growth, and mainframers are as optimistic as ever about the future of Big Iron.
All things considered, the IT hiring outlook is extremely positive. That's the most important takeaway of a recent IT hiring survey.
Not all backup appliances -- enterprise or small office -- are the same. Use these parameters to help decide which one best meets the needs of your enterprise.
The use of proprietary mainframe servers continues to decline -- for everybody but IBM. System z, in fact, is doing just fine. The rest of the mainframe field? Not so much.
Application performance must be evaluated by looking at what your end users experience, not just what dashboards tell you is going on.
Remember all the talk about runaway data center electricity consumption? As it turns out, it might have been overblown -- perhaps even alarmist.
With all the emphasis on cloud computing, applications must overcome browser-related performance issues.
A new report from security specialist McAfee warns that the information security sky is nigh on falling.
Are vADCs a wholesale replacements for pADCs? Can't these application delivery controllers co-exist?
Neither iOS nor Android has been designed with enterprise security in mind. That makes securing them a challenging proposition.
Cloud storage is starting to catch on. Here are the basics you need to know.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
Two and a half years on, CA says it has substantially delivered on its Mainframe 2.0 vision.
Cloud computing is a popular architecture, and U.S. agencies are finally getting on board.