-
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
-
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
-
Your employees are comfortable with social networks. How can those networks be turned to your business advantage?
-
Users working with cloud applications, mobile devices despite IT ban.
-
Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.
-
When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.
-
We examine the three characteristics any cloud infrastructure should have.
-
E-mail isn't dead. In fact, it's more alive and robust than it has ever been.
-
Your business continuity plan must focus on three elements: people, infrastructure, and processes.
-
We examine policy considerations and how to manage security policy in a mixed environment.
-
Learn how the new functions that perform calculations on ordered data sets in this excerpt from "Murach's SQL Server 2012 for Developers."
-
-
Storage growth, lack of qualified management personnel often underestimated.
-
A well-architected modern messaging infrastructure will give your enterprise the agility to adapt quickly to changing application requirements without the constraints of cloud providers.
-
Before you implement a next-generation firewall, follow these three tips to ensure project success.
-
A study of corporate e-mail and file transfer habits highlights security concerns.
-
We examine the risks, challenges, and benefits of the cloud and where the technology is headed.
-
Almost all enterprises say automating manual tasks is important for operational productivity, so why aren’t they automating more?
-
Compuware’s Outage Analyzer tracks cloud and third-party Web service outages; Prolexic releases DDoS downtime cost calculator.
-
What are the benefits of HTML5 to your organization, and what skills will you need to make the transition a success?
-
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
-
Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.
-
Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.
-
New CA Technologies survey sheds light on mainframe’s future role.
-
Moving from private to public or hybrid clouds can be risky. These best practices can help you avoid common traps.