It appears that IT is near the inflection point between fear of water and the need to support advancing architectures. More >
Darren Cunningham, VP of marketing for SnapLogic, says rather than build out its own API management platform, SnapLogic is opting to partner with third parties to provide access to that functionality. More >
With the cloud, we seem to be diverging from the usual pattern, or at least the process is being drawn out due to the radical and fundamental way it affects the entire data stack, and the entire business model. More >
By diversifying itself across a range of disciplines and then resisting the temptation to dominate everything it touches, IBM is setting itself up for the long game. More >
Datawise.io CEO Jeff Chou says the forthcoming release, Project 6, makes use of open source Kubernetes orchestration software within its cluster management software for Linux to make it simpler to deploy Docker containers in a production environment. More >
Like many IT vendors, EMC is taking advantage of Docker containers to essentially make support for any given server platform a non-issue. More >
Dell conducted a study to fully understand exactly how technology is shaping the workforce and help its customers respond to these challenges and opportunities.More >
One Internet of Things expert gives his views on the lack of standards today and what that means for companies getting into IoT in the cloud.More >
One tech CTO provides an intriguingly candid assessment of the current and future roles of the CIO and the CTO as they change in the face of the cloud.More >
Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.
LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?
According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.
While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape.More >
The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS cod...
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial ...
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the archi...
This chapter excerpt describes how to green your data center(s) and servers: choosing green suppliers, planning buildings ...