John Edwards

John Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications, including CIO, Computerworld, Network World, CFO Magazine, IBM Data Management Magazine, RFID Journal, and Electronic Design. He has also written columns for The Economist's Business Intelligence Unit and PricewaterhouseCoopers' Communications Direct. John has authored several books on business technology topics. His work began appearing online as early as 1983. Throughout the 1980s and 90s, he wrote daily news and feature articles for both the CompuServe and Prodigy online services. His "Behind the Screens" commentaries made him the world's first known professional blogger.

10 ways to improve IT performance (without killing morale)

10 ways to improve IT performance (without killing morale)

Pushing harder isn't necessarily the pathway to achieving stellar results. From monitoring for burnout to leveraging the latest management techniques, here’s how to keep your IT team humming.

5 steps to becoming a global IT leader

5 steps to becoming a global IT leader

International management success requires skill, respect and patience. Here’s your game plan for making the most of a global management opportunity.

20 ways to rekindle your passion for IT

20 ways to rekindle your passion for IT

When the flame driving your career flickers out, it's time to tap into a new energy source.

7 simple ways to fail at agile

7 simple ways to fail at agile

Creating and sustaining a successful agile program requires a strong commitment and careful planning. Yet ruining a functional agile initiative is remarkably easy.

Demystifying the dark science of data analytics

Demystifying the dark science of data analytics

Knowledge and planning transforms data analytics from a "dark science" into a mainstream business tool.

When to kill (and when to recover) a failed project

When to kill (and when to recover) a failed project

Admitting project failure is never easy, but sometimes the kill decision turns out to be the best decision. Here's how to know when to scrap and when to save a failing project.

Disaster recovery vs. security recovery plans: Why you need separate strategies

Disaster recovery vs. security recovery plans: Why you need separate strategies

Responding to a cyber security incident has its own unique objectives and requires its own recovery plan.

Make mine modular: The rise of prefab data centers

When John Campbell talks about Purdue University's soon-to-be implemented modular data center, he can hardly hide his enthusiasm.

Grow your data center with colocation

Brian Burch knew the moment had arrived. Two of his data center's key services -- availability and business continuity -- needed fast and dramatic improvement. Design and location limitations meant that his company's existing data...

A hardened approach to system security

Glenn Phillips, president of Pelham, Ala.-based Forté, says that the dedicated Windows workstations his company sells to hospital emergency room administrators must not only be secure, but absolutely tamperproof as well. After all,...

Maximizing server uptime: Best practices

In an IT world full of elusive goals, there's probably no target as slippery and generally elusive as server uptime.Keeping servers alive and awake, or at least ready to instantly spring into action whenever needed, is an ambition...

How to minimize server consolidation mistakes

Joe Latrell, IT manager and lead programmer for, a real estate data services company in Lancaster, Pa., knows that it's all too easy for even a knowledgeable and experienced IT veteran to make mistakes while...

The incredible shrinking data center

Tom Gonzales is planning to shrink his company's data center footprint from 45 feet by 15 feet to a mere 12 feet by 12 feet -- and he couldn't be happier. "We're using more space than we need," he says. "We're going to return some of...

Want to bone up on wireless tech? Try ham radio

John D. Hays, an IT manager in Edmonds, Wash., devotes most of his spare time these days to helping develop a communications system that's designed to integrate portable two-way radios with the global telephone network. The project's...

Enterprises cut costs with open source routers

Open-source is everywhere -- operating systems, application software, development tools. So why not routers, too? It's a question that Sam Noble, senior network system administrator for New Mexico Supreme Court's Judicial...

IT Recycling Pitfalls

Wendy Burchard, procurement coordinator in the IS department at the University of Richmond in Virginia, knows all about the pitfalls of recycling old equipment. Burchard discovered that the firm that was carting away the school's...

Tasks you fear to outsource but should try

In a sliding market, outsourcing looks increasingly attractive. In this era of drastic cost cutting and budget squeezing, many IT managers facing diminished budgets and frozen in-house resources are exploring ways of sending even...

Struggling with supersized storage

Tasty Baking Co. produces more than 4.8 million cakes, doughnuts, cookies and pies each day. And the Philadelphia-based snack food giant also manages to generate another crucial commodity -- computer data -- in equally impressive...

Securing Your Virtualized Environment

Virtualization promises to make IT departments more flexible, more efficient and -- perhaps most crucial in these tough times -- more frugal. But one advantage the technology doesn't provide is an escape from the need for strong...

Cutting Through the Fog of Cloud Security

Daniel Flax, CIO at New York-based investment banking and financial services firm Cowen and Co., relies on cloud computing to automate his company's sales activities. While he's satisfied with cloud technology's potential to lower...

Load More