IoT has joined the long and ever-growing list of acronyms IT professionals love to invoke when talking shop. The difference with this acronym is that -- despite its techie ring -- it stands for business transformation.
At a recent Harvard University event, academics and industry professionals shined a light on the ethical challenges in big data's near future.
Shhhh! The brain does its best thinking in quiet. Plus, meet the #HowOldRobot and find out how the IoT is influencing the Tour de France: The Data Mill reports.
General Electric CEO Jeff Immelt is taking on his biggest challenge yet to reinvent the company on the idea that its new platform will unite the Industrial Internet of Things.
IBM Watson continues to push the envelope for what can be done with technology and some fear the cognitive computing system will push IT pros out of a job.
Legacy data centers with proprietary code and outdated business practices are familiar, labyrinthine and difficult to leave behind.
Brocade has partnered with two more Wi-Fi vendors to offer enterprise customers a more flexible wireless network.
Part three of our series on network security lays out some of the major criteria to consider when purchasing network security tools for your enterprise.
The HP-led OpenSwitch community is likely to attract the interest of large enterprises with Web-scale data centers.
Here are some important criteria for hiring a partner to review your information security program, with a focus on HIPAA and HITECH compliance.
Expert Ed Tittel describes the purchasing criteria for Web fraud detection systems and explains how they can protect banking, e-commerce and other industries.
Two separate reports noted that cybercrime costs are significant. Some experts said reallocating budget resources to application layer security may be the answer.
Before purchasing application testing tools, you need to know how to evaluate them. Trial versions, vendor research and assessing your organization's needs may help.
Experts Matt Heusser and Michael Larsen present use cases for three categories of application testing tools you need to know: automation, bug tracking and coverage.
Matthew Heusser's new book, "Save Our Scrum," explains the risk behind diluted Scrum and how to make Scrum implementations work for your enterprise.
The Dell PowerVault NX Series consists of three models that support file- and block- storage but not flash. We outline the specifications of each model and its capabilities.
Customers Calvary Church and Look Photography needed a more cost-efficient file-sharing tool and found Connected Data Transporter did the trick.
Data capacity challenges -- and the anxiety they bring -- result from the rapid explosion of data growth combined with barely increasing budgets.