* Indicates field is required
Making the IP voice decision, Enterprise VoIP, VoIP standards and protocols, VoIP migration strategies, Quality of Service (QoS) for VoIP, VoIP security, Enterprise communication applications, IP communications tools, Hosted VoIP, VoIP carrier market, VoIP for small business, Wireless networks, VoIP management, Network design, Network performance management, Routing and switching, Network administration, Network protocols and standards, Virtual private networks (VPNs), Network security, Networking career resources, Introduction to networking, Networking for small business, Wide area networks (WANs)
While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
Use these free RFP template examples for ERP to make the best use of your business' technology resources.
This app's for you: The future of mobile personalization goes way beyond a recommendation for the next movie to watch or the closest pizza joint. But, the wonder of super-targeted apps has its creepy side too.
Medical and pharmaceutical researchers wrestle with finding meaning in big data variety and find that technology alone is still not up the task.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this two-part Q&A, Jeffrey Ritter identifies five common, persistent 21st century information governance myths and explains why adapting data management processes to the digital age is not as radical as some think.
Patrick Gilmore, CTO of the Markley Group, discusses how cloud providers and customers must work together to offset cloud security risk.
As 'dark data' piles up, so do its associated risks and information governance issues. In this Ask the Expert, Derek Gascon offers steps for addressing dark data's GRC complications and explains how new data classification tools can help.