IT Management

Articles

Survey Reveals Message Supervision Plays a Growing Role in Risk Prevention

Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. More >

Another Type of Citizen Integrator: The Mobile App User

Vendors are studying how mobile apps are used and coming up with 'recipes' to help them integrate them without IT's assistance. More >

Defining Deep Data: What It Is and How to Use It

The Deep Data framework is based on the premise that a small number of information-rich data streams, when leveraged properly, can yield greater business value at lower cost than vast volumes of data. More >

What Does the Enterprise Really Want from the Cloud?

For all the hand-wringing, it seems apparent that the cloud will eventually emerge as the dominant form of IT through attrition. More >

Key Principles to Web-Scaling a Network

Gracefully supporting the "going viral" nature of our world is what the next generation of networks is all about, and it is starting to affect enterprises as much as content providers. More >

Dell vs. HP: What a Difference Five Years Makes

Rob Enderle says Dell is busting its hump to get ready for tomorrow, while HP is busting its hump to get through today. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Job Interview Tips: Talking About a Horrible Boss

Quick, name a horrible boss you've had (or have). Unless you've yet to hold a job, it's unlikely that you had any trouble bringing a name or two (or three) to mind.

IBM Embraces Open Source RAD Platform

Many organizations have application development backlogs, so IBM joined Ionic to help reduce that backlog using tools that are inherently cross platform.

Six Mistakes that Lead to Poor Enterprise Software Adoption

Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software.

Editor's Choice

Key Principles to Web-Scaling a Network

Security Staffing

Gracefully supporting the "going viral" nature of our world is what the next generation of networks is all about, and it is starting to affect enterprises as much as content providers.

 More >

Atlassian Updates JIRA IT Service Platform

Commvault Extends File Sharing Capabilities

Dealing with Interruptions: Recognize the Seriousness of the Problem

802.11ac Wave 2 Is a Big Commitment

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date