UC systems, which already come with built-in IP integration, are gradually taking on the characteristics of a more distributed, embedded architecture that fits nicely within the peer-to-peer, software-driven, Web-enabled networking that IP allows.
One thing's for certain: Your IT department's need for storage will continue to grow. The questions are: Should you invest in SAN or NAS? Will there ever be a time when these two technologies will merge into one?
Like it or not, instant messaging (IM) is one communication tool that's here to stay. Many users are ecstatic about IM: It's quicker than e-mail and less intrusive than the telephone. It's also riddled with security challenges.
101 is taking some of the strongest and most popular portions of <i>ES</i> and rolling them into a new publication that will focus on business intelligence.
Offsite classroom training is the most effective form of IT teaching when it comes to retaining learned material. Classroom training outside the office is also the most preferred learning method among managers, who like their training at a traditional speed in a place separate from the workplace.
Users want to go beyond messaging with sophisticated call management and mobile access that saves time and makes them more productive. Here's what IT needs to know.
Pharmaceutical giant GlaxoSmithKline PLC uses p-to-p software to share data with its partners.
To consolidate over 300 servers in three data centers, the Bank of Montreal turned to IBM, Inrange Technologies and StorageTek.
What do you get when you cross a peer-to-peer (p-to-p) network (mostly used for trading pirated music and pornography) with a highly redundant server cluster (mostly used for mission-critical applications in Fortune 500 companies)? The answer: grid computing.
BrightStor ARCServe 9 boasts usability, reliability enhancements, simplified pricing model.
Enterprise Portal 5.0 matched with new rapid development environment.
New initiative to promote importance of IT security education.
Redmond signs deal with RSA to use SecurID component and token technology.
Symantec security expert sheds light on what last week's DDoS attacks say about a secure Internet.
Unisys offers hardware, software, and storage packaged into three different bundles.