IT Management

Articles

Could the Next-Generation Thin Client Come from Computer Gaming?

We could eventually see the NVIDIA Shield console as the preferred replacement for our desktop PCs. More >

Six Steps to Surviving Your First Breach

Once you accept that everything that can go wrong will do so at the worst possible time, there are things that can be done today to help rein in the trials of the future. More >

Tough Times for Tablets: Plenty of Ruggedized Devices Available

More tablets used for work are finding their ways into harsh environments; ruggedizing them is very important. More >

Project Scope Management

This excerpt from chapter 10 focuses on creating a requirements management plan and requirements traceability matrix. More >

WhatsApp Surge Spotlights Need to Address BYOD Security

IT departments need to educate users about the security and privacy risks such apps raise, and provide them with a secure, enterprise-ready alternative. More >

Capitalizing on Big Data: Analytics with a Purpose

As these emerging technologies continue to race ahead, there is an unprecedented opportunity to harvest those data streams and generate incredible new insights. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date