The Rent vs. Buy Decision
Our sample cost-benefit analysis calculator, a supplement to our report, Fundamentals: Cloud vs. In-House IT: Spend Smart in 2012, can help you get an idea of the total costs, whether you choose the...
View ArticleResearch: State of Storage 2012
Data center storage shows all the signs of a maturing discipline: IT professionals are more concerned about data reliability, security and performance vs. just keeping up with capacity demands....
View ArticleNetwork Computing Digital Issue: March 2012
Private Cloud Blueprint We walk you through the steps needed to take your private cloud from idea to reality
View ArticleFundamentals: Understanding Flat Networks
A flat network or fabric provides more paths through the network and can maximize bandwidth and better support a highly virtualized data center. We'll look at standards-based approaches to designing a...
View ArticleInformationWeek Digital Issue: March 5, 2012
Predictive IT AnalyticsThese systems can provide invaluable insight—vital if a private cloud is in your future.
View ArticleStrategy: How to Manage Identity in the Public Cloud
Use of the public cloud for enterprise applications complicates what was already a complicated task: identity management. As companies increase their use of cloud-based applications, IT and security...
View ArticleInformationWeek Print Issue: March 12, 2012
New IT RulebookIt's time to rewrite the rules for how business technology gets done
View ArticleStrategy: Detecting and Defending Against Advanced Persistent Threats
APTs are a growing problem for enterprises big and small. Protecting your organization from these targeted threats requires constant vigilance, ongoing employee training and a concerted effort to align...
View ArticleIT Pro Impact: Piston Cloud
If OpenStack sounds appealing but the prospect of downloading, installing and customizing a suite of open source packages is anything but, Piston Cloud is an attractive alternative. Its unique setup...
View ArticleStrategy: What's Next for Certificate Technology
A recent rash of certificate authority breaches has left a bad taste in many people’s mouths. There is no one reason for the breaches. The compromises were the result of a breakdown in people,...
View ArticleInformationWeek Supplemental Issue: March 2012
Cloud CalculationsThe nature of pay-as-you-go makes the ROI calculation seem easy. It's not.
View ArticleHow LTE Changes Mobility
Long Term Evolution is global, it's fast, and it's available now on 57 networks in 34 countries. Too bad it faces significant obstacles.
View ArticleInformed CIO: Is Your IT Infrastructure Ready for Mobility?
No one likes to think about a large meeting with multiple mobile devices bringing a WLAN to its knees, but we've seen it happen. Here's how to help your wired and wireless networks seamlessly support...
View ArticleStrategy: Tracking the Source of APTs
If you think that your organization hasn't been affected by an advanced persistent threat, you probably haven't looked hard enough. Identifying that your organization is under attack is difficult...
View ArticleStrategy: NoSQL Everywhere? Not so Fast
NoSQL Everywhere? Not so Fast: Enterprise big data workloads are incredibly diverse and require a smart mix of conventional SQL for bedrock, low-latency structured data tiers and NoSQL for unstructured...
View ArticleResearch: 2012 Network Computing Salary Survey
While staff and managers are satisfied with their jobs overall, more than 50% of staff and management got raises of less than 5% or had their pay frozen, and about a quarter saw benefit cuts.
View ArticleCloud Beyond SaaS
SMBs have saved big buying complex software on a subscription model. Here's how to determine if infrastructure services can pay off, too.
View ArticleBest Practices: 10 Steps to an IT Service Catalog
They promise faster service deployment, more flexibility for IT, chargeback capabilities and better resource/utility monitoring, so it’s no wonder we’ve long been intrigued with the concept of a...
View ArticleStrategy: IPv6: This Time, It's for Real
In 2012, IPv6 support will be turned on and left on. Here's how to prioritize projects, from key enterprise applications to external websites, so that IT can get the organization compliant as smoothly...
View ArticleInformed CIO: BYOD Demands a Unified Plan
IT teams supporting a mix of conventional PCs, ultrabooks, and iOS and Android devices have learned a few hard truths: End user computing has become nearly as complex as data center operations. The...
View Article
More Pages to Explore .....