IT Management

Articles

Plexxi Partners with Decision Lab on Machine Learning for Networks

The goal is to create a dashboard that enables network administrators to make better informed decisions based on all the events occurring across the network. More >

Pushing Hyperscale to the Extreme

By building or leasing hyperscale resources in both populated and remote areas, the enterprise gains the ability to match resources to data needs according to a wide range of requirements. More >

802.11ax Holds Promise Beyond Higher Speed

The Institute of Electrical and Electronics Engineers’ 802.11 Working Group continues to churn out useful standards. The latest, 802.11ax, has been in the pipeline for several years. More >

FCC Shrouds Itself in Secrecy over DDoS Attacks and Response

The FCC is unwilling to discuss its cybersecurity efforts, which begs the question of whether this is a good or bad strategy overall. More >

AWS Adds Raft of Management and Security Tools to Cloud Service

AWS is moving to extend investments in machine learning algorithms and serverless computing frameworks to automate as many low-level administrative and programming tasks as possible. More >

Hackers Say Privileged User Credentials Favorite Way to Get Your Data

Once you have someone’s credentials, you pretty much have the keys to the kingdom. It’s difficult to detect an intruder who has used legitimate credentials to gain access. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series uses 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Don’t Fear the Breach; Do Fear the Misinformation

Security isn’t just about endpoint protection and data breaches. We are working and living in a world without true boundaries and where misinformation meant to cause damage is spreading as quickly as real information.

 More >

VM Density: A Question of Balance

How to Demonstrate ROI to Avoid Slashing the Training Budget

IT Automation Has Only Just Begun

Laptop Bans: Air Flight a Front Line in the War Against Terror

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.