Use these free RFP template examples for ERP to make the best use of your business' technology resources.
This app's for you: The future of mobile personalization goes way beyond a recommendation for the next movie to watch or the closest pizza joint. But, the wonder of super-targeted apps has its creepy side too.
Medical and pharmaceutical researchers wrestle with finding meaning in big data variety and find that technology alone is still not up the task.
Isolated, dedicated grounds, telecom grounds -- the performance and, more importantly, safety of data center equipment -- rely on proper grounding.
No mechanical refrigeration or dehumidification. No war between IT and facilities. Hear how Facebook's choices yield a PUE consistently below 1.10.
Find judging criteria and category descriptions here for the 2014 Modern Infrastructure Impact Awards.
To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
Video: Insider threats expert Randy Trzeciak explains why non-malicious insiders, particularly developers, pose as much risk to an enterprise as intentionally malicious insiders.
Moving old, critical applications to the cloud requires IT to consider the offerings of cloud.
You can't measure user experience with a ruler, so measuring user experience objectively is generally a matter of aggregating subjective opinions.
Tracking defects can benefit the development team if done for the right reasons. Explore the reasons to track defects in this expert response.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.
DDN's high-performance computing storage systems provide Department of Energy lab with 75 GBps read/write operations and eliminates bottlenecks.
EMC spins out two new Isilon NAS models, including one for Hadoop analytics, and adds flash read cache.