SOA and EAI, Application development, Enterprise application software, Data management
Servers and storage, Networks, Cloud computing, Virtualisation
IT spending, Service management, Strategy, IT governance, Case studies
Disaster recovery, Data privacy, Legal issues, IT assets
Making the IP voice decision, Enterprise VoIP, VoIP standards and protocols, VoIP migration strategies, Quality of Service (QoS) for VoIP, VoIP security, Enterprise communication applications, IP communications tools, Hosted VoIP, VoIP carrier market, VoIP for small business, Wireless networks, VoIP management, Network design, Network performance management, Routing and switching, Network administration, Network protocols and standards, Virtual private networks (VPNs), Network security, Networking career resources, Introduction to networking, Networking for small business, Wide area networks (WANs)
Paul Kirvan discusses the importance of creating an after-action report following a disaster recovery exercise and offers tips on creating the report.
Learn why data protection practices common in traditional file storage environments aren't the best option for objects, and how metadata can help.
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Are you keeping your project pipeline in check? Review our recent stories and take our quiz to assess your knowledge of IT project management essentials.
Agile development guru Jim Highsmith makes the case to CIOs that adaptation is tantamount to business survival. Here is his prescription for adaptive leadership.
Listen up IT executives, it's time to stop pondering the IT skills gap and adapt leadership, training and recruiting styles to resolve it. IT and business strategist Harvey Koeppel explains how.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Data protection expert Winn Schwartau discusses information security and why companies should remember the past when developing cybersecurity strategy.
The former chief information security officer of the CIA discusses modern cybersecurity and why companies must remember the data protection basics.
In this Q&A, ARMA 2014 Conference presenter Barclay T. Blair discusses how information governance strategies can help with big data risk management.