IT Management

Articles

Momentum Gains for SDx

The growth of SDx technology, which covers everything from networking and storage to end-to-end data center platforms, is expected to affect a wealth of industry verticals and will boost key IT segments. More >

Rogue Wave Software Acquires Akana for API Management

One of the primary reasons Rogue Wave Software is moving to acquire Akana is because the Akana API management platform can be deployed on premise as well as invoked as a cloud service. More >

Quest Software Simplifies Identity Management via the Cloud

Rather than having to implement policies at the client level, each endpoint can now make use of Dell Boomi to access an instance of One Identity Manager software from Quest Software. More >

BlackBerry and the Problem of Recreating a Company and Image

BlackBerry has largely moved from being a hardware vendor to being a software vendor. This is a very rare pivot. More >

We Haven’t Seen the Last of Mirai, That’s for Sure

The bad news is that Mirai hasn’t gone away. In fact, it seems to have burrowed itself more deeply into the internet. More >

San Francisco Muni Ransomware Attack Should Be a Warning to Critical Infrastructure

Muni lost money by giving away free rides over the weekend, but it didn't pay the 100 bitcoins in ransom demanded by a hacker. This ransomware episode should teach several lessons. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.