Download for later:
- Internet Explorer: Right Click > Save Target As
- Firefox: Right Click > Save Link As
Making the IP voice decision, Enterprise VoIP, VoIP standards and protocols, VoIP migration strategies, Quality of Service (QoS) for VoIP, VoIP security, Enterprise communication applications, IP communications tools, Hosted VoIP, VoIP carrier market, VoIP for small business, Wireless networks, VoIP management, Network design, Network performance management, Routing and switching, Network administration, Network protocols and standards, Virtual private networks (VPNs), Network security, Networking career resources, Introduction to networking, Networking for small business, Wide area networks (WANs)
Download for later:
While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
On-the-spot decision making and in-the-field analysis are but two mobile business intelligence benefits that it a worthy investment.
The best enterprise social networks are fine-tuned to corporate culture. Using gamification to spur employee adoption of ESNs will depend on your workforce and industry regulations.
For the San Jose Sharks, employee morale and back-end integration factored heavily into choosing an enterprise social network tool but, as SearchCIO discovers, every company has its own reason for upping its ESN game.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this two-part Q&A, Jeffrey Ritter identifies five common, persistent 21st century information governance myths and explains why adapting data management processes to the digital age is not as radical as some think.
Patrick Gilmore, CTO of the Markley Group, discusses how cloud providers and customers must work together to offset cloud security risk.
As 'dark data' piles up, so do its associated risks and information governance issues. In this Ask the Expert, Derek Gascon offers steps for addressing dark data's GRC complications and explains how new data classification tools can help.