What should go into your organization's after-action review following a disaster recovery test? #CIOChat participants suggest what to include in the report and why.
If CTO Niel Nickolaisen saw a rogue application, he would crush it. If he spied an unauthorized device connecting to his network, he shut down the attempt. That was then. Now he's living the BYOx life.
How does a retailer known for customer service get even better at it? Matt Fisher of Nordstrom uses text analytics to parse tens of thousands of online customer reviews.
Did you miss what happened at Dell, IBM and other major tech vendors so far in 2014? Here are the top five data center news stories to keep you in the loop.
Security isn't easy to quantify, like PUE or server utilization. But it is possible to apply metrics to improve data center gateway safety.
Do you know where that Unix server's documentation is? How much the spare parts will cost? How to automate service delegation? The clock's ticking.
Lancope security research director Tom Cross says network security teams have a lot more to learn from military doctrine beyond the kill chain concept. Find out more about terrain analysis and deceiving the enemy in this Q&A.
Find the right monitoring and management tools for your cloud applications by choosing a strategy that works for your specific needs. Use the data to assess the overall quality of experience of your applications with application driven analysis
With zero-touch appliances and cloud-based gateways, VeloCloud offers a cloud WAN service that hybridizes MPLS and broadband links.
Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response. Threat expert Nick Lewis highlights his key takeaways.
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb.
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
Tracking defects can benefit the development team if done for the right reasons. Explore the reasons to track defects in this expert response.
Successful continuous integration requires testable acceptance criteria that help to guide developers.
QA consultant Gerie Owen discusses the use of two post-production metrics: defect removal efficiency and defect detection percentage.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.
DDN's high-performance computing storage systems provide Department of Energy lab with 75 GBps read/write operations and eliminates bottlenecks.
EMC spins out two new Isilon NAS models, including one for Hadoop analytics, and adds flash read cache.