Learn how IT and finance can work together to succeed in the post-recession economy.
You forgot to provide an Email Address.
This email address doesn’t appear to be valid.
This email address is already registered. Please login.
You have exceeded the maximum character limit.
You forgot to provide your first name.
You forgot to provide your last name.
You forgot to provide a company name.
You forgot to provide a job title.
You forgot to select your job function.
You did not select the number of employees at your company.
You did not select which industry you are in.
You did not provide a full local address.
You did not select the country you are from.
You forgot to provide a phone number.
This phone number format is not recognized. Please check the country and number.
"Crossing the Chasm" author Geoffrey Moore has developed a framework on how to talk digital investments with the business: The Data Mill reports.
The Apple Watch offers nuggets of data that could drive employee productivity. We asked our readers to weigh in on the potential usefulness of the Apple Watch for business.
The platform business model develops and derives value from the ecosystem of users it connects. CIOs need to be in on it.
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
Virtualization, rapid refreshes and shadow IT make it harder for IT departments to really know -- and properly license and support -- what they have. You need an IT asset management system to show you.
The increasing expectation for high quality content and the growth of IoT will be helped as edge computing brings nodes closer to end users.
Harvesting your networking data to generate business intelligence can be done -- if you know how to begin.
Cisco plans to acquire OpenDNS and use its security-as-a-service products to reduce the number of IoT threats customers face.
Industry analysts discuss steps to protect WLANs against honeypot APs and how Juniper's alliance with Ruckus could shake up the market.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.
Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done.
Gerie Owen provides an overview of ALM methodology, covering its requirements, development and maintenance phases and its core components.
Expert Matthew David goes over key factors to consider when buying mobile application development tools, like security, testing and hosting.
When it comes to choosing between Agile or Waterfall projects, Agile proves more valuable for helping development teams and stakeholders retain focus on the right software requirements.
Red Hat's roadmap for Ceph and Gluster products includes a unified management console, support for containers and protocol/interface expansion.
Condusiv adds an analytical engine to its V-locity software that boosts I/O performance in Microsoft environments.
DataDirect Networks announces plans for a hyper-converged system that can scale to petabytes, along with capacity improvements for its WOS platform.