IT Management

Articles

IBM Launches Project DataWorks to Advance Analytics

Project DataWorks can be employed on top of Apache Spark and the IBM Watson cognitive computing platform running on the IBM Bluemix PaaS environment. More >

Radial Exec Responds to Criticisms in Forrester Report

Radial exec is on a mission to help online retailers thrive, despite having the dominance of Amazon perpetually looming over them. More >

7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. More >

BlackBerry and the Lesson That the Technology Market Fails to Learn

Tech giants could take a valuable lesson from The Art of War when they choose how to structure their market battles. More >

Hardware in a Software-Defined Universe

It is tempting to think of a world where the enterprise can simply ignore bare-metal provisioning, since all the real action is taking place on the virtual layer or above. But this would be a mistake. More >

SAP Aims to Deliver Big Data as a White Glove Service

SAP is adding what amounts to a “white glove service” for deploying Hadoop and Spark; many IT organizations don’t have the skills required to deploy Hadoop and Spark on their own. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

7 Ways the Internet of Things Will Impact ITSM

Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity.

How Inhi Cho Suh Embodies What the Future of IBM Will Hopefully Be

A Korean-American whose family emigrated to the United States when she was five years old, Suh embodies what one hopes is the future of IBM.

5 Essential Skills for the IT Leader

Successful IT leaders have to have very specific skills, but still know how to run a team, meaning they must master the so-called soft skills that are not taught formally.

Editor's Choice
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.