IT Management

Articles

LTE’s Meteoric Growth Not Slowing Down

LTE leads to the use of more data and the purchase of bigger data plans. More >

CEOs Talk Better Cybersecurity, but Are Disconnected from Security Efforts In-House

Corporate leaders publicly agree that cybersecurity is a top priority for business, but recent studies prove that most CEOs don't understand how it works. More >

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. More >

Can BlackBerry Fix Android for Work?

While this collaboration doesn’t fix Google’s security problem completely with Android, it does potentially reduce it significantly. More >

Docker Makes Orchestration Tools Available

The tools are designed to make it easier to provision infrastructure, create clusters and combine multiple Docker containers within a distributed application. More >

Impersonating IT Staff Becoming a Popular Phishing Tactic

An email that looks like it is coming from the IT department is a lot harder to ignore, especially if the email covers a legitimate area of concern with the business. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Five Ways to Stay Productive While Working Remotely

Security Staffing

There's no magic bullet, but the essentials are to make sure to have the right tools at your disposal while on the move to communicate with your teams in ways that fit your needs, as well as being flexible, clear and direct in your communication.

 More >

Extreme Winter Weather Highlights Need to Prepare for the Unexpected

Connected Data Unveils File Share and Sync Appliances

PernixData Updates Flash Storage Management Software

Success of the IoT Depends on Interoperable Standards

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date