QASymphony has released a new set of tools to help IT leaders more easily research the status of application development projects. More >
Large data volumes drive the need for data lakes. Here are six tips on how a data lake can reconcile large volumes of data with the need to access it. More >
IT management teams have grown up around the technologies that have emerged over the years, so the challenge is finding a way to unify all the IT management silos. More >
Tech news this week includes a report on the TV Everywhere service, Android OS goes to work, brain-to-machine sector growth, and Wi-Fi Sense woes. More >
As authorities dig deeper, they find that several recent breaches may all link back to one Chinese cyberespionage group. More >
HTML5 has proven to be an attractive platform for developers, but it is not without its faults. More >
Digital subscriber line (DSL) technology has been on the endangered species list for years.More >
The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.More >
Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.More >
As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.
Intel and Micron just announced a new memory technology, 3D XPoint, that has the capacity to render many devices we use obsolete.
Assuming that your average annual cost per employee is $50,000, the time spent with email is costing your company $60 million every year!
It's important to keep in mind that employees are arguably an organization's biggest asset, and therefore require different considerations than other audiences potentially affected by a breach.More >