DataM7-290x195.jpg

Racing Toward a Post-Cloud World

A post-cloud world marks the continuation of a decades long transition away from centralized data infrastructure to distributed architectures that will soon inhabit virtually everything around us, and perhaps inside us.

More >
AI2-290x195.jpg

Vulnerabilities Run Rampant in Robots

The machines indeed may be able to take over, as machines are abetted by hackers.

More >
DataM25-290x195.jpg

What Can Quantum Computing Do for the Enterprise?

The enterprise is about to gain access to an entirely new level of processing power in the form of quantum computing. But what can this do for garden-variety business processes?

More >
IT_Man49-290x195.jpg

Microsoft and Steelcase Finally Begin to Obsolesce Cubicle Hell

Every firm should take a look around and realize it is time to recognize and step up to addressing this problem and end the pervasive problem of traditional cubicle farms and windowless offices.

More >
IT_Man44-290x195.jpg

Low-Code Development Helps IT Tame Enterprise Software

A survey of IT and business leaders found that 80 percent have had to change their daily operations to accommodate the way their enterprise software works. That is a major problem.

More >
DataM21-290x195.jpg

Cisco Strengthens Hyperconvergence Platform

An update to Cisco's HyperFlex systems adds a distributed file system to make it feasible to run a larger number of enterprise-class workloads on an HCI appliance.

More >
IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Learn more >

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

Learn more >

DataCtr5 Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

Learn more >

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

Learn more >

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.