Answering the Call for BYOD
Answering the Call for BYOD
This expert guide examines mobile device virtualization and discusses what kind of role it can play within your organization.
CTO Niel Nickolaisen explains how a custom cloud met changing customer demands, and how he pulled one off while sidestepping the evils of customization.
In this Ask the Expert, Forrester analyst Jeffrey Hammond tackles how to redirect the development culture to support mobile application development.
Find out how to tweak your mobile app dev efforts to achieve a five-star app rating in this Ask the Expert with Forrester analyst Jeffrey Hammond.
We use an IBM System z mainframe and it's time to update some aging tape drives. How big of a difference is there between the tape storage products on the market?
Tape, disk, virtual disk and other storage media all work with my mainframe, but how do I decide which is the best option for storing data?
I want to share a tape drive between the IBM System z mainframe and other IBM systems. Are there prerequisites for tape drive sharing?
SN blogs: This week, analysts say that application ease of use is the most important; FIDO is working on new authentication standards.
WAN aggregation allows continuous, high-performance networking, and software-defined networking delivers greater security, visibility and control. In this tip, expert John Burke evaluates both technologies to help you better optimize your network.
The Georgia World Congress Center has upgraded to 802.11ac Meru wireless technology to support thousands of attendees, exhibitors and mobile devices.
Secure software development expert Gary McGraw says what's great about the IEEE's new design center is that it tackles the thorniest problem.
Video: Keith Barker of CBT Nuggets shows how to use the BeEF Project, a free penetration testing framework, to train employees on Internet browser security.
In an advisory Friday, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
Is there a place for a centralized test team in enterprise software testing at a company that has adopted Agile methodologies? Read Agile expert Matt Heusser's answer.
Negative, anonymous feedback puts both testers and project managers in a difficult situation. It's hard for testers to act on vague complaints and awkward for managers to provide the necessary clarification. This expert advice may offer a way out.
It turns out working with legacy code might not require days of pouring over cryptic comments. For finding and fixing bugs, developers can use simple testing tools to peel and slice their way down to the problem.
Cloning and snapshotting can both be good approaches to disaster recovery. Learn what environments are best suited to each.
The vendor comes out of stealth with Discovery hybrid storage arrays that offer real-time data governance and data protection capabilities.
Boston Celtics VP and CTO Jay Wessland says the team is considering a shift from scale-up storage to address the explosion of digital video.