Tom Koulopoulos, co-author of "The Gen Z Effect" spoke to SearchCIO about how Gen Z-ers think about privacy, data ownership and failure, and what CIOs should do about it.
At Goldman Sachs, a homegrown graph analytics platform has become a tool for compliance and fraud detection. The use case is a good one because risky behavior is also social behavior, according to an expert.
Keeping up with the speed of innovation is only one of many hurdles today's CIOs must clear. In this #CIOChat recap, take a look at the top CIO challenges in today's digital era.
Increasing physical demands of modern IT gear can pose problems for classic rack enclosures. Watch for these factors when buying new racks or equipment.
I want to install a virtualization environment with physical servers for failover and a storage server to boot up some virtual servers in our network. How can I do this?
Space, power, cooling and equipment improvements give your data center new life. Do it right to keep costs down.
SN blogs: This week, analysts discuss how big data initiatives are affecting businesses; one expert warns about the dangers of unknown appliances in the data center.
Download this free chapter excerpt from "Network Know-How" to gain insight into basic network troubleshooting techniques. Identify and solve most networking errors in your environment.
Virtualization and storage spark fears of a new era of black box opaqueness for today's network engineers. But hope remains.
Expert Dan Sullivan outlines three use case scenarios for security analytics tools and explains how they can benefit the enterprise.
The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security.
The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk.
When testing public APIs, test expert Johanna Rothman recommends testing API functionality, endpoint security and, above all, proper connectivity.
For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin?
Compliance regulations are constantly evolving. Learn about how best to manage software testing practices.
IBM's DS8870 is a storage array platform designed for large enterprise SAN environments with mission-critical workloads.
Promise Technology's VSky object storage can handle petabytes of data and is aimed at rich media and video surveillance.
The Vault Linux storage conference in Boston concluded with a keynote including speakers from Facebook, HGST, NetApp and Red Hat.