Download for later:
- Internet Explorer: Right Click > Save Target As
- Firefox: Right Click > Save Link As
Making the IP voice decision, Enterprise VoIP, VoIP standards and protocols, VoIP migration strategies, Quality of Service (QoS) for VoIP, VoIP security, Enterprise communication applications, IP communications tools, Hosted VoIP, VoIP carrier market, VoIP for small business, Wireless networks, VoIP management, Network design, Network performance management, Routing and switching, Network administration, Network protocols and standards, Virtual private networks (VPNs), Network security, Networking career resources, Introduction to networking, Networking for small business, Wide area networks (WANs)
Download for later:
While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
In this Ask the Expert, Forrester Analyst Jeffrey Hammond outlines the dos and don'ts for developing purpose-built mobile applications.
CTO Niel Nickolaisen explains how a custom cloud met changing customer demands, and how he pulled one off while sidestepping the evils of customization.
In this Ask the Expert, Forrester analyst Jeffrey Hammond tackles how to redirect the development culture to support mobile application development.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In this tip, learn how information classification and data mapping are essential first steps to e-discovery strategy in the age of big data.
In this tip, learn five strategies to ensure cloud-based information governance processes meet organizations' unique e-discovery management needs.
Corporate compliance and risk management expert Jeff Jenkins outlines three invaluable -- but often overlooked -- strategies that companies should incorporate during cybersecurity program development.