-
By
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
-
Your employees are comfortable with social networks. How can those networks be turned to your business advantage?
-
By
Users working with cloud applications, mobile devices despite IT ban.
-
By Stephen Swoyer
Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.
-
When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.
-
By
E-mail isn't dead. In fact, it's more alive and robust than it has ever been.
-
By
Your business continuity plan must focus on three elements: people, infrastructure, and processes.
-
By
We examine policy considerations and how to manage security policy in a mixed environment.
-
By
Learn how the new functions that perform calculations on ordered data sets in this excerpt from "Murach's SQL Server 2012 for Developers."
-
By
-
Storage growth, lack of qualified management personnel often underestimated.
-
By
Before you implement a next-generation firewall, follow these three tips to ensure project success.
-
A study of corporate e-mail and file transfer habits highlights security concerns.
-
By
Almost all enterprises say automating manual tasks is important for operational productivity, so why aren’t they automating more?
-
By
Compuware’s Outage Analyzer tracks cloud and third-party Web service outages; Prolexic releases DDoS downtime cost calculator.
-
What are the benefits of HTML5 to your organization, and what skills will you need to make the transition a success?
-
How can you make sure your mobile applications are secure? A security expert offers several suggestions.
-
By
Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.
-
By
Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.
-
By
New CA Technologies survey sheds light on mainframe’s future role.
-
By
Following these five rules will help your organization get your security keys under control.
-
Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.
-
Service will combine compute and storage infrastructure, new VPN technology.
-
By
One in 10 mobile apps leak passwords; many share personal information with third parties, including advertisers.
-
By
Fourth quarter reassessments not unexpected, analyst firm notes.