Tech promotion in broad entertainment can be a strong showcase of the technology and proof that the company gets that it isn’t just a man’s world anymore. More >
Steve Sims, chief design officer for Badgeville, gives his thoughts on gamification in the enterprise and where he sees it going. More >
The folks who are telling us that there will be so much demand that we better build ever higher capacity networks are the same people who benefit from selling those networks. More >
Perhaps part of the problem is that no one seems sure about who is in charge of security. More >
While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect security policy management basics. More >
It has become a question of balance and value, with IT organizations being asked to set up and monitor millions of alerts and identify the most important ones in an instant. More >
Digital subscriber line (DSL) technology has been on the endangered species list for years.More >
The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.More >
Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.More >
Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.
HP is failing because the folks who run it don’t know how to run a company like HP. Board members could save it, but maybe they are part of the problem.
Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.
A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach.More >