IT Management

Articles

Defining the ‘A’ in Agile Enterprise Architecture

No matter how all this shakes out, the key to success in an architecturally driven enterprise will be to match the application and/or service to the correct architecture, whether it is controlled or dynamic. More >

BlackBerry Agrees to Acquire Good Technology

This week in tech, BlackBerry to buy out Good Technology, AppLock security app filled with vulnerabilities, and cellphone use on planes still up in the air. More >

What to Look for When Hiring an Independent Contractor

Hiring an independent contractor could be the perfect solution to your hiring woes, but you need to be just as diligent in screening these types of hires as you are traditional employees. More >

Why You Need to Be More Worried About Protecting Your SaaS Data

We’d all probably be surprised by how many IT departments, users and executives have failed to fully understand the nuances of proper SaaS data backup and recovery. More >

BMC’s CEO Bob Beauchamp and the Art of a Turnaround

Whether you are buying from, working for, or investing in a firm doing a turnaround, looking for these key elements will help you decide whether you are investing in a viable future or a certain disaster. More >

Why All Businesses Need an Emergency Response Plan

Every organization should be prepared for an emergency event--be it weather related or otherwise. Having a detailed plan is key to keeping employees and the business safe. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Three Ways to Eliminate Annual Employee Reviews

More companies are making this major change in order to benefit all employees and the bottom line.

Beware the Hidden Dangers of the Internet of Things

It finally feels as though we're about to hit the point of no return with IoT. IT departments must now consider and address the security implications.

5 Big Mistakes New Employees Should Avoid

Starting a new job is a chance to start fresh with a brand-new group of colleagues. It's an opportunity to build on the skills you learned at your last job and develop additional areas of expertise.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date