Most Popular     |      Most Recent

2nd Watch Enlists New Relic to Help Manage AWS

29 Oct, 2014

As cloud computing continues to evolve, IT organizations should pay careful attention to how pricing models for the delivery of managed IT services are evolving. More >

A Five-Step Strategy for Developing Business-Savvy APIs

06 Oct, 2014

It may be time to rethink how APIs are developed as more established companies use APIs to open up and integrate existing enterprise apps.  More >

A Tale of Two Data Analytics Success Stories

23 Oct, 2014

One company with a bottleneck and one city with a crime problem found success in data analytics projects. More >

All Blogs
Loraine Lawson

The Quickest Way to Find a Strategic Use Case for the Internet of Things

Integration   |  Loraine Lawson   |  31 Oct, 2014

The shift from tactical to strategic applications of the Internet of Things will be key to realizing its much hyped potential.... More >

0 Comment

Arthur Cole

Stacking Up the Container Revolution

Infrastructure   |  Arthur Cole   |  31 Oct, 2014

Containers represent something we rarely see in IT: tremendous gain without a lot of pain.... More >

0 Comment

Sue Marquette Poremba

Russian BlackEnergy Malware Story Hidden by White House Breach

Data Security   |  Sue Marquette Poremba   |  30 Oct, 2014

Malware that has attacked entities outside the U.S. has been found on networks of  US-based SCADA industrial control system suppliers.... More >

0 Comment

Carl Weinschenk

Inside the Data Throttling Lawsuit Against AT&T

Data and Telecom   |  Carl Weinschenk   |  30 Oct, 2014

The button AT&T pushed that resulted in the lawsuit is likely the appearance that it was using the issue as a way to obscure unfair marketing practices.... More >

0 Comment

Mike Vizard

Microsoft Extends Big Data Management Scope on Azure

IT Unmasked   |  Mike Vizard   |  30 Oct, 2014

Microsoft is pulling together an evolving portfolio of tools to manage and analyze data on its cloud.... More >

0 Comment

Kachina Shaw

Pew: Experts Expect Significant Cyberattack by 2025

Governance and Risk   |  Kachina Shaw   |  29 Oct, 2014

The Pew Research Internet Project collected predictions and thoughts about coming cyberattacks from over 1,600 experts. They are not optimistic.... More >

0 Comment

Kim Mays

Small Business League Crusades to Shut Down 25-Year-Old Government Subcontracting Test Program

SMB Tech   |  Kim Mays   |  29 Oct, 2014

The American Small Business League and others are attempting to fight against the age-old Comprehensive Subcontracting Plan Test Program.... More >

0 Comment

Rob Enderle

The ‘Black Box’ Era of IT

Unfiltered Opinion   |  Rob Enderle   |  29 Oct, 2014

With a black box approach, the solution is held to a set of required performance requirements and the vendor sweats the small stuff, not the buyer.... More >

0 Comment

Don Tennant

New Layers of Gender Inequity Surface in Tech Sector, Research Finds

From Under the Rug   |  Don Tennant   |  29 Oct, 2014

A report from Catalyst shows an even more surprising picture of the challenges women face working in the tech sector.... More >

0 Comment

Kachina Shaw

IT Professionals Frustrated by Lack of Advancement

Charting Your IT Career   |  Kachina Shaw   |  24 Oct, 2014

Robert Half Technology asked IT professionals what caused them the most on-the-job frustration.... More >

0 Comment

Kim Mays

BIOS Protection Guide Helps IT Secure Server Firmware

New Tools for IT   |  Kim Mays   |  23 Oct, 2014

The National Institute of Standards and Technology has created a free document that details computer BIOS security.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date