dcsimg

IT Management

Articles

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security. More >

Laying the Groundwork for Modern IT Automation

By identifying what they want to automate first, most enterprises should be able to create an implementation plan that is both effective and non-disruptive. More >

When RPA Meets the Enterprise

Expectations are that RPA will take the enterprise by storm in the next few years, but this will only happen once the executive suite is convinced they will be a help, not a hindrance. More >

On Track to a Fully Automated Enterprise

With AaaS, organizations gain the same benefits as with any as-a-Service deployment: low upfront starting costs, broad scalability, and continuous upgrades to the newest versions of software. More >

Now Comes the Hard Part of Cloud Computing

Given all the complexities involved, it is little wonder that so many organizations have found moving to the cloud a much bigger challenge than they might have originally anticipated. More >

Legacy Systems and Data Management Issues Hinder Digital Business Transformation

Business and IT leaders are discovering that data management and the rigidity of existing legacy systems make it difficult to achieve digital business transformation goals. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

The IoT in 2019 and Beyond

Once the IoT becomes a service- and revenue-generator in its own right, rather than an extension of legacy infrastructure, we will safely be able to say that we live in a truly connected universe.

New Focus on Data Privacy Directs Compliance Trends in 2018

The need for improved privacy compliances is necessary. In 2018, we got our first look at the way compliance is trending.

Cloud Security Trends from 2018

Cloud security trends are front and center this year, and they are shifting in new ways. We depend on cloud services more than ever, and you know wherever the users and the data are, the hackers will follow.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.