IT Management

Articles

Tough Choices in Digital Transformation

Instead of focusing on broad themes like “digital transformation,” organizations would do better to focus on specific technologies, like containers, and deploy them with clear and measurable goals in mind. More >

IT Leaders Need to Be Business Leaders First, CIO Says

The key to making an impact as an IT leader is to come to the table as a business leader who happens to be running the technology team, rather than purely as a technologist waiting to receive requirements to fulfill. More >

Intel Outlines Ambitions for Transforming Retail

The Intel Responsive Retail Platform (RRP) is an effort by Intel to create what amounts to a reference architecture for Internet of Things (IoT) applications in the retail sector. More >

Making Shadow IT Work for the Enterprise

Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management. More >

Digital Transformation Has Companies Re-thinking Security Strategies

In the age of digital transformation, improving the “security playbook” is necessary in order to avoid the C-suite level executive’s two worst nightmares: corporate financial data theft and customer information theft. More >

Why Ethics Recommendations Are Making Things Worse

You should never mix up what you have the right to do with doing the right thing. If you do, it will likely end badly for you and your firm. While the perception of an ethics problem is important, it is far more important to focus on behaving ethically. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Concerns Surrounding Identity Security

In all the predictions for 2017, few discuss identity and access issues, but as the line between professional and personal life continues to blur, IAM has to be a higher priority in the coming months.

 More >

IoT Security: Big Trouble in Small Packages

Algorithms Pale to Holistic, Human-Centric Recruiting Approach, Tech CEO Says

CA Technologies Sets Sights on Business Process Automation

Progress Being Made on NFV Interoperability

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.