-
Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?
-
The OpenStack community isn't impressed by interoperability of Microsoft's Hyper-V hypervisor with the OpenStack open source cloud project.
-
When business uncertainty is the "new normal," project management offices become critical in supporting strategic business priorities.
-
Social media, security, and customization all play a role in your choice of a cloud supplier.
-
These four best practices will help government and political organizations mitigate the effects of DDoS attacks.
-
Increasingly, Hyper-V and vSphere will operate in the same data center. What does that mean for IT?
-
A major hack of Zappos’ customer data has led to a lawsuit that may affect how “sensitive” information is secured.
-
The use of consumer cloud apps could compromise sensitive IT data. Industry veterans explain what IT should do to get the problem under control.
-
Selecting a cloud provider can be tricky. Here are four things you need to investigate before making your selection.
-
How to make mobile device management a core part of your security management strategy.
-
With the limitations in IT budgets in 2012, the focus will be on investing in systems and services that optimize all the storage assets that enterprises already have rather than buying more capacity.
-
Outsourcing and managed services are constantly changing. We examine three ways the industry will adapt to technology and business changes this year.
-
SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.
-
Confusion about the trends and changes in virtualized backup poses a real threat to IT managers. Fortunately, the future is less hazy than it seems.
-
As more applications and data make their way to the cloud or are impacted by virtualization, data centers must adapt. The hybrid data center environment brings together the best of all worlds: cloud, virtualization, hardware, and co-lo.
-
Enterprises adopting Apple products in impressive numbers.
-
Arguments for and against moving to a de-duplicating virtual tape appliance from our storage analyst, Jon Toigo.
-
What are the common misperceptions about unstructured data are explored, and how can this data be exploited for game-changing insights?
-
There’s no doubt that customers will continue their migration from in-house BI to BI in the cloud. We explore best practices for cloud BI and the limitations this technology imposes.
-
Success with enterprise business goals demands strategies for enterprise data.
-
Three key moves for Linux this year will impact enterprise IT.
-
A look at how security is evolving around three key information technology developments.
-
Mobile devices became targets just as more workers were connecting to corporate assets using their personal devices. What's ahead for mobile IT in 2012?
-
What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?
-
Is a caching device right for your organization?