Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
Four reasons you should consider an investment in IT process automation
To get the most from your Web 2.0 technologies, combine them with Enterprise 2.0.
All of the Energy Stars in the world will not keep the lights from going out.
Why is IT the last department to have automated tools?
What features will be included in future enterprise software products? The answer lies in today's consumer software.
Readers share their reactions about Jon Toigo's analysis last week.
Learning the difference between single layer cell (SLC) and multi layer cell (MLC) Flash memory technologies opens the door to better understanding solid state drives.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
We look at where software-as-a-service is heading.
Employees who believe they may be fired may steal proprietary information to blackmail management
Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
How the right software development partner can help to retain your in-house IT team
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Mainframe pros have joined with IBM to tout the virtues of Big Iron-based cloud computing.
How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.
Sun's Storage 7000 push may lack a crucial component -- vision -- according to one storage analyst.
Promises comes and go. A few have morphed into something different.