eweek.com

Calculating the ROI of IT Asset Management

Every data center conducts some type of regular audit. But IT professionals and data center managers may not be aware of the high – and often hidden – costs associated with their manual audits.

More >
eweek.com

Nigerian Scams Now Targeting Businesses

419 scams are making a comeback, but now rely on malware to gain access to business systems.

More >
eweek.com

Cybersecurity Grades Released for Key Industries

Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed.

More >
eweek.com

Seven Key Issues to Research Before Integrating Cloud

How do you shift your thinking away from tactical integration to a more strategic approach to connecting with the cloud?

More >
eweek.com

Five Considerations When Selecting Voice and Data Plans for Business

With hundreds of mobile plan options on the market, deciding which voice and data plan is most suitable for your business can be a huge challenge.

More >
eweek.com

Moving Toward a More Modular Future

A modular solution may not be optimal for all use cases, but when it comes to ramping up infrastructure quickly and easily, it’s hard to find a better one.

More >

IT Downloads

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

DataM14 Large Scale and Big Data: Processing and Management

In this excerpt from chapter 9, readers are provided on overview of the NoSQL world, exploring the recent advancements and the new approaches of Web-scale data management.

Learn more >

Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

Learn more >

Job Description: Senior Software Engineer/Big Data

The ideal candidate will have previous Big Data experience using Hadoop/Storm and machine learning to solve large-scale problems. .

Learn more >

cloud20 Protection Options for Virtualized Infrastructures in IaaS Cloud

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.