As infrastructure scales up and out, even small gains could very well translate to big savings to the operational bottom line. More >
Did you know that in 1952, when tape was first created, it weighed 935 pounds and held 2.3 MB of data? Today, it weighs closer to 12 pounds. Now that’s a digital diet! More >
Running a simulation before launching an app will delay the process, but it ultimately improves business performance by allowing dev teams to get it right the first time. More >
BlazeMeter this week announced that its application load generating software can now be run on top of Docker containers. More >
At some point this summer, ARIN will no longer be able to fulfill requests for IPv4 addresses. But that's not a huge problem if ISPs continue working toward IPv6. More >
Delphix announced this week it has acquired Axis Technology Software, a provider of data masking software that is used to hide sensitive data within a particular application. More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
One Internet of Things expert gives his views on the lack of standards today and what that means for companies getting into IoT in the cloud.More >
One tech CTO provides an intriguingly candid assessment of the current and future roles of the CIO and the CTO as they change in the face of the cloud.More >
Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.
HP is failing because the folks who run it don’t know how to run a company like HP. Board members could save it, but maybe they are part of the problem.
Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.
A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach.More >
The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS cod...
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial ...
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the archi...
This chapter excerpt describes how to green your data center(s) and servers: choosing green suppliers, planning buildings ...