IT Management

Articles

Advice for New CIOs: Direct Traffic or Risk Getting Run Over

Diana Bersohn, managing director of Accenture Strategy, addresses the fact that CIOs tend to have the shortest tenure in the C-Suite, and what CIOs can do to change that. More >

The Seven Ways to Review Code Like a Boss

The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing team. More >

The Pros and Cons of Combining Master Data Management with Big Data

When it comes to master data management and Big Data, you may be better off leaving each to its own. More >

Turning ‘The’ Cloud into ‘Your’ Cloud

How do you determine which cloud is the right cloud? More >

Surface 3: The Ideal Blend of Work/Portability Emerges

Surface 3 may be the closest thing to a perfect storm product when Windows 10 releases because it will combine the massive advancements of both Microsoft and Intel into a single platform. More >

ASG Launches Application for Managing Reference Data

In theory, standardizing terms should be relatively simple. In practice, different business units often begin to describe the same process differently. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Developing Tech: What's Next?

Consumers will start to require more utility from tech, and the enterprises behind the scenes will be forced to rise to those expectations.

Chip Wars: Looking at the Strategies of AMD, IBM, Intel and Qualcomm

Four big players are taking four very different paths to success.

Fourteen Android Apps to Help You Get the Job Done

With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date