IT Management

Articles

The Case for 'Craft IT'

Much like mass-produced foods filled with ingredients no one can understand, "junk food" IT can make a company sick and sluggish. More >

The Enterprise Data Center: Can It Last in the Cloud?

Today’s infrastructure will be worthy of TLC for some time, but it will have to share an ever-larger portion of the budget with the emergent cloud. More >

Expanding SMBs to Benefit from Salesforce’s Desk.com Business Plus for Customer Service

Salesforce recently released its latest CRM solution, Desk.com Business Plus, which helps SMBs provide flexible, personalized service with a focus on growth. More >

Salesforce Extends Service Desk Reach from the Cloud

Leyla Seka, vice president and general manager for Desk.com at Salesforce, says the Desk.com Business Plus edition provides service managers with more granular control. More >

How to Better Integrate Cloud Apps by Managing the Integration Lifecycle

While plug-and-play applications may be in our future as more SaaS providers embed integration technology into their applications, it's not yet a reality in most cases. More >

Snowflake Computing Pushes SQL Data Warehouse into the Cloud

Snowflake Computing CTO Benoit Dageville says the SQL-compatible Snowflake Elastic Data Warehouse is designed to support both structured and semi-structured data. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Five Trends Shaping the Future of IT

Five technology and operational trends that will help corporate IT organizations deliver better business outcomes via the optimal use of technology.

LastPass Breached Again. Is This a Trend?

LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?

Ten Top-Paying Tech Security Jobs

According to a new analysis of Dice salary data, the need for security professionals has translated into salaries for certain tech professionals that greatly exceed the baseline for tech-pro salaries.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date