IT Management

Articles

AMD vs. Intel: A Sun Tzu Lesson in Long-Term Strategy

With its Ryzen launch, AMD is avoiding making a strategic mistake it has made several times in the past, says analyst Rob Enderle. More >

The Next Evolution of Ransomware Attacks

We will see shifts in ransomware, including how attackers will target victims, who they’ll target, and the role IoT will play in ransomware, both as an attack vector and attack target. More >

Priorities: Technology and Digital Transformation

Perhaps the most important distinction between today’s digital transformation and the technology evolutions of the past is the fact that achieving the desired user outcome is now the driver of technology decisions, rather than the other way around. More >

Informatica Expands Push in Data Governance

The Informatica Axon offering marks the first time Informatica will provide applications specifically designed for IT professionals tasked with being the stewards of data governance within their organizations. More >

Addressing the Cybersecurity Career Gap

It seems like those interested in a career in cybersecurity should have no problems finding a job or advancing up the ladder. But problems in education, job listings and realistic expectations abound. More >

The Hyperconverged Approach to the Hybrid Cloud

Development of data infrastructure along cloudy, hyperconverged lines undoubtedly has its share of twists and turns in store, but it produces a data environment that is highly scalable with vastly reduced operational responsibilities. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Seven Tips for Staying Employable in the ‘Smart Machine Age’

Ed Hess and Katherine Ludwig argue that adapting and staying employable in what they call the “Smart Machine Age” requires a willingness to learn new skills and to embrace certain behaviors.

 More >

Email Threat on the Inside

Oracle Dives into IoT as a Service

The Hyperconverged Approach to the Hybrid Cloud

Fine-Tuning the Enterprise Container Environment

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.