In 2011, enterprises acknowledged that cloud is in their future. What will 2012 bring to help companies feel more secure in adopting the cloud platform?
Disaster recovery is a growing part of IT's budget, but IT still needs quicker, more efficient, and more affordable backup and recovery solutions into one seamless process.
The virtualization momentum of 2011 will lead to some interesting trends in 2012, involving pricing, heterogeneity, and a company’s right to choose.
IT is demanding that the tools it uses provide higher levels of automation. What automation will we see in 2012?
Key events in cloud computing this year, and three predictions for its growth in 2012.
A look back at the leading mobility trends of the year, and three predictions for 2012.
What's it take to get hired in IT these days? Skills, for starters.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.
A tech-industry veteran looks back over the past year and predicts the big IT trends we can look forward to in 2012.
Windows on the Big Blue's hardware is almost here.
Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.
Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.
With its recent acquisition of Platform Computing, IBM is betting on emerging demand for high-performance computing solutions.
Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.
A new push by partners Cisco and Citrix might encourage IT organizations to take a serious look at desktop virtualization.
Almost half of U.S. information workers already split time between home, office, or other locations
Few IT organizations are prepared to manage the use of social media in the enterprise. This is particularly true from a security perspective.
The V-party may be a grassroots movement energized by widespread anger against the predatory behavior of storage and system vendors, but it seems to have followed the pattern of many movements -- technological and political.
New workloads account for almost one-third of MIPS growth, and mainframers are as optimistic as ever about the future of Big Iron.