IT Management

Articles

How to Avoid Getting in Hot Water When You Poach an Employee

Author James Pooley's advice on how employers can stay on the right side of the law when hiring key employees away from the competition. More >

Amazing Growth in Data Requires Innovative New Solutions

We're in a data deluge that's easy to drown in. Dealing with this much data requires innovative data storage solutions, including the cloud. More >

UI Is a Big Challenge for Mobile Developers

Wrapping up this week in tech, mobile developers aren't moving as quickly as hoped, DOCSIS 3.1 soon to be certified and voice recognition use increasing. More >

ZeroStack Service Automates Spinning Up of Private Clouds

CEO Ajay Gulati says the SaaS app provides a control plane based in the OpenStack framework in the cloud that is linked to 2u appliances via a set of APIs developed by ZeroStack. More >

Emergency Response Plan

From irate customers and/or employees to severe weather to fire and medical emergencies, it's critical that organizations have a plan in place to ensure staff know what to do, who to contact and where critical infrastructure resides. More >

Mesos Promises to Change Data Center Management Equation

IT organizations will soon see a common abstraction layer across both Linux and Windows. That abstraction layer will make it feasible for a single IT administrator to manage thousands of servers in and out of the cloud. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their Q3 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.

Jeff Bezos’ Confirmation Bias Could Kill Amazon: A Teachable Moment

Jeff Bezos seems to have on blinders. The New York Times' expose on the internal environment at Amazon should be a huge wake-up call for him instead.

10 Features that Will Make You Love Windows 10

IT Business Edge's Paul Mah looks at the final version, and highlights a number of features that should make you love Windows 10.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date