-
Benefits, challenges, and best practices for incorporating a modular data center into your environment.
-
Management salaries rise; managers overseeing service-oriented architectures and business analytics shops command highest premiums.
-
If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.
-
Q2 2012 State of the Web report highlights dangers of out-of-date software, misdirection of “trustworthy sites.”
-
MED-V won't help you avoid Windows XP's expiring life cycle support, Microsoft says.
-
Co-location facilities, mirrored data, hot-standby servers -- data center managers are doing all they can to avoid the debilitating effects of power outages. Or are they?
-
Hardware migrations can be tricky. We discuss the keys to Kansas City Southern Railway's migration from mainframe to Linux.
-
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
-
The cloud isn't right for every application. We explain the benefits of moving to the cloud, how to get "cloud ready," and what applications should remain within your data center.
-
The key to protecting enterprise assets is to start with the right objective. We explore five steps you can take to shift your focus and tackle a new backup/recovery reality.
-
Main issue addressed: format problems with SQL Server reporting services.
-
Apple surges ahead; interest in Microsoft offerings tepid or falling.
-
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
-
Data centers growth has IT looking for alternatives. Is moving our processing and storage chores to the cloud a solution, or does it just shift the problem somewhere else?
-
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
-
U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.
-
Cost per record breached is highest in the U.S. and Germany, lowest in India.
-
BYOD is here to stay; ignore it at your peril.
-
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
-
A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.
-
VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.
-
Cloud-based application supports features of Office 2013.
-
What makes Akka so valuable for building today’s distributed applications?
-
By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.
-
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.