Analyses

group of diverse people in shadow against red/yellow sky with dramatic shadow
ibm microsoft

mobile apps and touch screen

Download our new mobile management PDF

We've just created a new, easily printable version of our comparison chart with 11 vendors in 10 features/functions categories.

6 key network considerations to take into account before migrating to the cloud

How to prevent cloud migraines before making the shift

UC in the Cloud – Panacea or placebo?

Separating fact from fiction in a cloud-based unified communications deployment

Understanding how new solid state drive technologies can benefit the data center

By combining SSDs and HDDs in the right mix, performance gains are possible while keeping costs under control

google home mario queiroz

Can Google's virtual assistant find a home in enterprise?

Google CEO Sundar Pichai credits Amazon with paving an early path for consumer virtual assistants, but the company's first response to Amazon Echo, Google Home, could eventually play an important role in the business world.

For the elderly, smart homes mean the promise of more freedom

While not a panacea, new technologies promise to enable the elderly to stay in their homes longer and more safely

psychology mind state brain

Hacker psychology: Understanding the 4 emotions of social engineering

And some key considerations for better positioning your employees against falling prey to these types of attacks

cloud talent hiring

How startups can attract and retain cloud talent

The top three differentiators startups can highlight to maximize their chances of securing employees with a strong cloud skill set

Four major trends in enterprise mobility  

Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging

making it bigtime

How AEG’s CIO plans to hit the big time

Former Royal Caribbean Cruises CIO Bill Martin is creating a data governance strategy at Anschutz Entertainment Group to better connect with customers.

Why automation is the key to the future of cyber security

Examining the perceived disadvantages and the significant truths about automation’s role in cyber security

crystal ball business prediction data woman

What’s on tap for Linux container technology in 2016

Some debates remain, including what operating system will run under container applications

Network Performance Monitoring is dead

IT organizations who cling to the old models of monitoring and managing will be at a significant disadvantage to their counterparts who adapt by embracing new technologies.

samsung developer conference primary

4 key takeaways from Samsung's Developer Conference

Virtual reality, the Internet of Things and smartphones took center stage at Samsung's annual developer conference this week, but what the company didn't say was equally notable.

ethernet fast speed

The Ethernet community is working to introduce six new rates in the next 3 years

New rates are targeted at applications vs. the historic approach of turning the crank

In the Software Defined Data Center, application response time trumps infrastructure capacity management

With applications consisting of a plethora of services delivered from a range of resources, End User Experience (EUE) is key

frustrated computer user

DevOps and deviance: How bad IT practices become accepted as normal

What IT can learn about the study of the “normalization of deviance” phenomena

unicorn about to be dinner for jaguar 2

Savvy CIOs poised to snap up talent cast off by struggling unicorns

CIOs have a great opportunity to hire technology workers jettisoned from startups forced to curb expenses.

Load More