IT Management

Articles

ZeroStack Service Automates Spinning Up of Private Clouds

CEO Ajay Gulati says the SaaS app provides a control plane based in the OpenStack framework in the cloud that is linked to 2u appliances via a set of APIs developed by ZeroStack. More >

Emergency Response Plan

From irate customers and/or employees to severe weather to fire and medical emergencies, it's critical that organizations have a plan in place to ensure staff know what to do, who to contact and where critical infrastructure resides. More >

Mesos Promises to Change Data Center Management Equation

IT organizations will soon see a common abstraction layer across both Linux and Windows. That abstraction layer will make it feasible for a single IT administrator to manage thousands of servers in and out of the cloud. More >

Must-See Robotics at RoboBusiness 2015

Robotic hardware combined with cognitive intelligence and cloud computing capabilities signifies a host of new opportunities across many industries. More >

C-Level Execs Aren’t Stepping up to Prevent Cyberattacks, Survey Finds

A survey by Accenture Strategy found that though 63 percent of enterprises experience a cyberattack once a week, executives aren't doing enough to prevent them. More >

IBM Extends Storage Reach into the Cloud

Jeffrey Barnett, portfolio manager for software-defined storage at IBM, says IBM is showcasing advanced deployments of software-defined storage technologies. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q3 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Jeff Bezos’ Confirmation Bias Could Kill Amazon: A Teachable Moment

Jeff Bezos seems to have on blinders. The New York Times' expose on the internal environment at Amazon should be a huge wake-up call for him instead.

10 Features that Will Make You Love Windows 10

IT Business Edge's Paul Mah looks at the final version, and highlights a number of features that should make you love Windows 10.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date