IT Management

Articles

Is the Data Lake the Right Tool for Analytics?

The most disturbing aspect in the development of a Big Data analytics engine is not the actual infrastructure or architecture to be deployed, but the urgency with which it needs to be done. More >

Why It Is Well Past Time to Take the Hack Harassment Pledge

Tech should be full of joy, excitement, and discovery and shouldn’t be a tool used to take the sparkle out of anyone’s eyes.  More >

HP Embeds Privacy Screen in Laptops

HP Sure View's privacy mode blocks all the light from the screen from being seen by anyone other than the primary user of the device. More >

5 Ways to Solve the Open Source Industry's Biggest Problems

Five challenges preventing enterprise IT from shifting to open source and tips for tackling them to keep the future of open source heading in the right direction. More >

The Case Against Biometrics

Developers like biometrics, but creative hacks have many concerned that the solution may not be as secure as we hoped. More >

How Developers Balance Speed and Quality

How does Dev balance the pressure for speed with the need to ensure quality? Here are a few best practices for striking an appropriate balance to ensure that speed and quality is not an either/or choice. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware

While most ransomware reports have focused on phishing as the conduit for infection, organizations can fall victim in alternative ways.

An Expert Weighs in on the Fine Art of Salary Negotiation

Although negotiating a salary is one of the most important aspects of job hunting, very few of us are adept at it.

10 Bad Habits that Should Be Banned from the Workplace

Unhealthy work habits, like staring at computer screens and rushing through fast-food lunches, are taking their toll in the form of increased absenteeism, lost productivity and higher insurance costs.

Editor's Choice

How Developers Balance Speed and Quality

Security Staffing

How does Dev balance the pressure for speed with the need to ensure quality? Here are a few best practices for striking an appropriate balance to ensure that speed and quality is not an either/or choice.

 More >

Exablox Unveils Flexible All-Flash Array

NVIDIA Bolsters GPU GRID

IDVector Unfurls Secure VPN Service

Big Data Requires More than Just Big Storage

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.