
In Pictures: Seven best practices for Cloud security
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
If there's anything Cal Henderson knows about, it's scaling technology to keep up with extremely rapid growth.
The U.K. Cabinet Office has reportedly asked government departments and agencies to try to find ways to end their reliance on Oracle software, but it's not clear that approach will really solve its problems.
Microsoft's Windows Server 2003 has its Windows XP moment coming very soon, and that's bad news for IT leaders who have been dragging their feet.
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
The cost of finishing a massive SAP software overhaul at a New York gas utility will rise to nearly US$1 billion from an original estimate of $383.8 million, a newly released audit report has found.
Microsoft is pledging dramatic improvements to its notoriously complex enterprise licensing, but experts are skeptical about the potential impact of the plan.
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
What's new, plus best mac-related tips
and tricks
The latest business news, reviews, features and whitepapers
Watch our video news and reviews from around the world
Comprehensive buying guides, features, and step-by-step articles