It can be tempting to stray from the security roadmap security professionals have put in place when data breaches like the Sony and Anthem breaches are all over the news. But experts say it's crucial to stick to the security basics.
With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.
A shared technology services marketplace, like the one recently implemented by Oakland County, Mich., offers a variety of benefits to governments constrained by tight budgets, including more affordable prices for services and interesting opportunities to analyze data.
Performance monitoring tools preemptively thwart run-the-business application problems, but only when you have the right APM tool for the job.
Disaster recovery planning and infrastructure builds vex IT managers. Cloud services offer lower costs and more flexibility, but not without risk.
Most of the IT budget goes to maintaining the data center hardware and software. Consider outsourcing for better support.
If HP acquires Aruba, it may slow the wireless networking company's ability to innovate and lead to a confusing product portfolio, Aruba customer says.
IBM and Juniper say they will work together to deliver customer intelligence to cloud and communications service providers.
Midokura has refreshed MidoNet with features that provide a bridge for VMware customers looking to move to OpenStack without using proprietary virtual networking technology.
Legal teams play a key supporting role in successful information security programs. Expert Mike Chapple reviews three areas where infosec pros and lawyers should work together, and offers tips to foster effective collaboration.
Macro viruses are back in the form of macro malware, creating a potentially major issue for enterprises. Expert Nick Lewis explains how to ensure your organization doesn't fall victim.
News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.
What is 'continuous' in software development? Combining iterative development with automation produces code so quickly it is now thought of as continuous.
Which database tools for testing should we choose? Learn about tools for testing and data analysis.
What's the tester's role in establishing user stories and acceptance criteria? Expert Amy Reichart discusses how much influence a tester should have.
Use this guide to determine if a SAN is right for your environment, or if you should go with DAS or NAS.
HDFS manages data across dispersed nodes, but an object storage system that leverages commodity storage can be a compelling alternative.
Allegiance Health is utilizing Seven10's Storfirst data migration software to transition from NetApp's StorageGrid to EMC Atmos scale-out cloud storage.