Is it better to go with a cloud vendor looking to expand into the enterprise or an enterprise vendor looking to expand into the cloud? More >
Expanding its campaign to eliminate the need for solid-state disks (SSDs) in primary storage environments, Violin Memory unveils extensions to its all-Flash storage platform. More >
The platform promises to give IT organizations managing IT infrastructure on premise the ability to programmatically manage the entire environment via a single high-level API. More >
It’s a good bet that once all the bugs are worked out and the compromises are made, composable infrastructure won’t be quite as idealistic as advertised. More >
Making Identity Mixer as a service that developers can invoke via an application programming interface (API) should considerably reduce the amount of inherent risk that organizations face when conducting transactions on the Web. More >
As many IT executives are finding out, there is more to Big Data than simply finding a place to store and analyze it. More >
“Green computing” and efficient operations are inseparable. Whether or not you call it something that makes for a good bumper sticker, it’s all about efficient enterprise facilities management.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
One Internet of Things expert gives his views on the lack of standards today and what that means for companies getting into IoT in the cloud.More >
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks.
Fixing a CEO is easy. You either mentor them properly or replace them. But once a board goes bad, there is no easy recovery.
Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
Learn how retailers who are armed with on-demand data can make split-second adjustments to capture a bigger slice of holiday spending and make 2015 their best year ever.More >
The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS cod...
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial ...
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the archi...
This chapter excerpt describes how to green your data center(s) and servers: choosing green suppliers, planning buildings ...