IT Management


The View from a Female Collegiate Athlete Turned Tech Entrepreneur

Joanna Weidenmiller, CEO of 1-Page, a talent acquisition and retention software company, gives insight into women in tech and running a successful company. More >

10 Best Practices for Sharing Sensitive Information with Vendors

As vendors have become more important in the day-to-day functioning of businesses, companies need to ensure that their data is safe on these third-party networks. More >

Dell and EMC Merger: The Likely Back Story

Merging a private and a public company at this scale is rarely done. Analyst Rob Enderle looks into the details. More >

Top 10 Strategic Technology Trends for 2016

Top trends for 2016 that will have a significant impact on organizations, end users and IT, create business disruptions, and require major investment. More >

Breaches Are Expensive, but Perhaps not Expensive Enough

Studies reveal that enterprises spend almost half a million to recover from a data breach; however, many still don't increase security efforts after. More >

Tablets’ Future May Hinge on Enterprise Success

Studies predict that the rise in tablet market sales is mostly due to increase in enterprise use. Does this foreshadow the future success of the device? More >

More Articles >


Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

The 2015 Nominees for Best Business Smartphone App Are…

In their fourth year, the Tabby Awards are introducing a new category specifically for the best business smartphone apps -- the Mobby Awards/Business.

Riverbed to Unleash Project Tiger to Kill Branch Routers

Riverbed CTO Hansang Bae says that rather than requiring IT to deploy and manage complex infrastructure inside the branch, Project Tiger will become the foundation through which storage and security services are provided in the branch office.

How to Be a Winner: 5 Keys to Achieving Big Goals

Everyone wants to do great things, but few actually do. Why? Most people are either afraid to think big, believe they don't have what it takes, or don't want to commit to putting in the kind of effort required to accomplish anything truly great.

Editor's Choice
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date