The cloud has changed infrastructure to be sure, but there is still a strong current of concern throughout the enterprise industry that it is not ready for mission-critical applications. More >
Large data volumes drive the need for data lakes. Here are six tips on how a data lake can reconcile large volumes of data with the need to access it. More >
Machine learning, neural networks and other advancements offer the possibility that enterprise data infrastructure will become more than a tool to be leveraged by business. More >
IT management teams have grown up around the technologies that have emerged over the years, so the challenge is finding a way to unify all the IT management silos. More >
Tech news this week includes a report on the TV Everywhere service, Android OS goes to work, brain-to-machine sector growth, and Wi-Fi Sense woes. More >
With the release of Windows 10, Rob Enderle speculates Microsoft's next moves as it tries to break ahead of its competition. More >
“Green computing” and efficient operations are inseparable. Whether or not you call it something that makes for a good bumper sticker, it’s all about efficient enterprise facilities management.More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
One Internet of Things expert gives his views on the lack of standards today and what that means for companies getting into IoT in the cloud.More >
As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.
Intel and Micron just announced a new memory technology, 3D XPoint, that has the capacity to render many devices we use obsolete.
Assuming that your average annual cost per employee is $50,000, the time spent with email is costing your company $60 million every year!
It's important to keep in mind that employees are arguably an organization's biggest asset, and therefore require different considerations than other audiences potentially affected by a breach.More >
The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS cod...
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial ...
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the archi...
This chapter excerpt describes how to green your data center(s) and servers: choosing green suppliers, planning buildings ...