IT Management

Articles

Changes Roiling Cable Operators and Their Vendors

Changes in the way people get their video alongside, of course, changes in how they consume it have ramifications on vendors as well as operators. More >

State of IT 2015: Mid-Year Check-In

IT reality check finds IT leaders staying the course heading into second half of 2015. More >

Alpha Software Simplifies Development of Forms-Based Mobile Apps

Alpha Software today previewed an update to its Alpha Anywhere mobile application development and deployment environment that simplifies the development of mobile forms apps. More >

Cultural Norms in IT Breed Toxic Employees, Training Exec Says

CEO of a leadership and training company speaks about points revealed from a survey on toxic employees and adds examples from her own experiences. More >

Five Ways to Address Your Data Management Issues

There's no one-size-fits-all solution for improving data storage -- rather, the tactic that fits best with your company is likely as unique as your data itself. More >

The Smartphone Kill Switch Evolves

Recent data shows that mandatory smartphone kill switches have reduced thefts by 32 percent, but it's not without issues. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Five Common Data Encryption Myths

Data encryption seems to be the logical choice when it comes to implementing a sound security strategy, but there are still skeptics.

New Cisco IoT Certification Fills Employers, Employees Needs

The new IoT-focused CCNA Industrial certification is a lab-based training and certification, and is part of the CCNA Industrial Education curriculum.

Five Highly Valued Soft Skills for IT Pros

As IT becomes more tightly integrated into the business process, the experienced IT professional is expected to be able to understand the business, communicate ideas with coworkers and clients, negotiate, and lead.

Editor's Choice

Vendor Risk Management: Ten Frequently Asked Questions

Security Staffing

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well.

 More >

IBM Expands Its Portfolio of Database Services

Niara Applies Hadoop to Security Analytics

Logentries Adds Docker API Support to Log Management Service

Big Changes in Store for Storage

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date