Application consolidation is never an end unto itself. It's the business benefits that matter. SearchCIO columnist Harvey Koeppel explains.
Edward Snowden and Bruce Schneier talk data encryption and privacy in a networked world. The Data Mill reports.
Will Microsoft's Windows 10, with a dusting of magic from HoloLens, reel enterprises and consumers back in? Also in Searchlight, President Obama targets cybersecurity in State of the Union speech; the most common password of 2014 was '123456.'
IT pros want to advance their careers. See which IT skills will enhance your worth in 2015, and the training and certifications that will propel you forward.
Follow these guidelines to expand data center capacity without the terror of wasted space or, even worse, tight capacity after move-in.
The mainframe is IT's original cloud, and there are still ways to float cloud operations onto big iron today. But is it pragmatic?
Cisco ONE provides a single license for all-in-one hardware and software package aimed at a specific networking use case, but it may be the high-priced option.
SN blogs: This week, an analyst discusses why browser-based communication is enhanced with WebRTC applications.
A10 Networks has re-architected the software within its application delivery controller, making it more customizable for inserting Layer 4-7 services in SDN, NFV and cloud applications.
A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.
Adobe's latest Flash zero day patch came Saturday, just two days after reports that the vulnerability was being exploited by drive-by-download attacks.
Expert Lisa Phifer discusses new Apple iOS 8 security features and potential pitfalls, as well as the enterprise security ramifications of new iOS features, including Extensions, Family Sharing and Apple Pay.
Learn about tips for choosing a testing service and whether it makes sense to test outside the business.
Private and non-public data must not be compromised during testing. Learn about data masking and the vendors that offer data masking tools.
Automated testing and continuous development have become the driving force for CTO Andy Piper as Push Technology evolves its middleware platform.
Find out the six finalists we think offer the best storage systems of 2014, while still using ‘old-fashioned’ spinning disk.
The finalists in the storage management tools category offer analytics, monitoring and automation for physical and virtual environments.
The Law Offices of Joe Bornstein filled performance, data classification and data protection checkboxes with startup DataGravity's Discovery Series array.