IT Management


Microsoft Moves Beyond Internet Explorer

Microsoft wants to create a strong niche for Edge. We’ll soon begin to find out in earnest if it has. More >

The Sad Story of HP Printers

If a firm doesn’t want to die on a pivot, it should always have several skunk works-like projects with independent funding looking at the alternatives, and executive support at the CEO level so existing legacy execs can’t kill the efforts. More >

Enterprise Vendor or Cloud Provider: Who Makes the Better Partner?

Is it better to go with a cloud vendor looking to expand into the enterprise or an enterprise vendor looking to expand into the cloud? More >

Smart Pattern Discovery: 5 Ways Retailers Can Make 2015 the Most Profitable Year Ever

Learn how retailers who are armed with on-demand data can make split-second adjustments to capture a bigger slice of holiday spending and make 2015 their best year ever. More >

Cyber Monday Doesn’t Equal Secure Monday

Any helpfulness when it comes to improving security of the customers will go a long way in keeping those same customers happy and returning at other times of the year. More >

Riverbed Fosters IT Management Collaboration

As IT environments become more complex, it’s clear that far too many organizations are spending more time trying to figure out what a problem may be rather than fixing it. More >

More Articles >


Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks.

Marissa Mayer and Meg Whitman Aren’t the Big Turkeys at Yahoo and HP

Fixing a CEO is easy. You either mentor them properly or replace them. But once a board goes bad, there is no easy recovery.

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.