Just how favorably does Microsoft's Hyper-V compare to established products from VMWare, Virtual Iron, and Citrix?
Is there a holistic solution for ensuring the secure, fast, and reliable delivery of applications?
A security researcher's speculation about a DNS flaw ignites another firestorm for full and responsible disclosure
Expect PSI's technology to pop up elsewhere -- perhaps in a low-end POWER-based mainframe
Microsoft seems serious about SaaS. If so, SaaS -- often seen as a disruptive technology -- might ultimately become a major disruptive market force.
Web 2.0 technologies have barely scratched the surface of application development. Here’s what’s in store.
IT must improve communications with its business users and develop business-centric measures.
Thanks to this month's DNS vulnerabilities, a lot of patching will be taking the time of DNS administrators. In fact, it might even seem like 2002 all over again.
Given the nature of technology and of business economics, are we ready for a storage revolution?
HP's POD is innovative and visionary, analysts say. In a world chock full of both innovation and vision, that's saying something.
Visionary companies will push project and portfolio management from the top down to develop basic management skills at all levels
Microsoft officials warn of a problem that arises after users apply a DNS patch to Windows XP and 2000.
Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.
With leading economic indicators sagging, you'd think the hiring outlook would be similarly bleak. Strangely enough, it may not be
Too many IT shops are deploying supposed technology solutions without fully understanding the complexity and collateral effects introduced into other parts of a dynamic system.
You can increase your chances of success by answering these five questions early in your virtualization project.
Could replacing core systems cause an organization’s identity to unravel?
How to store and manage all of the data created in the genotyping process and in subsequent analytical activities creates unique requirements for research scientists.
We could be on the cusp of another revolution: a c-business paradigm shift, driven by cloud computing.
As attackers increasingly target browser flaws, the Firefox update scheme serves as a model for the industry