IT Management

Articles

Why the Open Source Stars Must Align

One of the greatest obstacles to project success isn’t the proprietary competition – it’s the lack of communication between large open source projects. More >

Top Barriers to Effective Vulnerability Risk Management

When it comes to the effectiveness of traditional vulnerability risk management programs, the challenges are often rooted in the process itself. More >

Founder Recounts Surrender of InfoArmy, Eyes Future as Leader of Owler

Owler founder and CEO, Jim Fowler, recounts his experience with selling a successful company, starting a company that failed and then pivoting into a new successful company. More >

Defining Information Governance: An Exploration with Industry Experts

Until recently, much of the industry has been focused on applying principles used to manage physical records but they are now realizing that records management is no longer a sufficient solution. More >

What Makes a Good Chief Data Officer Candidate?

Loraine Lawson researches the role of the chief data officer and speculates from her findings what skills a good candidate might possess. More >

What Are This Country’s 10 ‘Geekiest’ Cities? The Answer May Surprise You

Predictive marketing firm, Mintigo, released its list of the top ten geekiest cities, and a few of the towns listed might surprise you. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Five Hidden Risks with Public Cloud Usage

While many enterprises are clearly realizing promised benefits from public clouds, there are still challenges and a consistent set of concerns.

The Seven Ways to Review Code Like a Boss

The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing team.

The Linux Foundation Starts Open Source Encryption Project

The Linux Foundation's Let’s Encrypt project will reduce the effort it takes to encrypt data in an application down to two simple commands.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date