The vast majority of employees who leave a company are honest, upstanding corporate citizens. But you never know when someone might leave on bad terms and then attempt to hack back into your corporate systems.
Stories by John S. Webster
As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix of corporate and personal access to data on the devices.
The emergence of BYOD policies and virtual desktop platforms, plus new integration and management tools, have removed the final barriers to widespread Mac adoption in the enterprise.
While nobody is predicting that the proliferation of mobile devices in the enterprise will create a full-blown bandwidth catastrophe, IT managers will have to move quickly to ensure satisfactory performance for employees accessing company data over wireless links.
Not too long ago, IT organizations turned to service-oriented architecture primarily as a way to integrate enterprise applications. But now large companies are using SOA to create components that can be combined and reused as services across multiple applications.
Not too long ago, IT organizations turned to service-oriented architecture (SOA) primarily as a way to integrate enterprise applications. But now large companies are using SOA to create components that can be combined and reused as services across multiple applications.
The RFID revolution won't be televised, so we decided to present it in slideshow format.
Since 2003, when EMC launched its transformation from a simple hardware storage vendor to a multifaceted information-infrastructure provider, it has racked up 15 straight quarters of double-digit revenue growth and strong profits.
Mergers and acquisitions have become a way of life across many industries. With vendors, competitors and in some cases their own companies consolidating at a rapid clip, enterprise IT managers and staffers at all levels have to stay on their toes in order to ensure job security.
In a former life, I was a sales guy. What I sold and who I sold to will remain nameless to protect the innocent -- namely me. Suffice to say, I was in computing sales, and I called on some large IT shops. Some years later, I traded in my flip chart for a keyboard after one of my best customers told me I couldn't sell snowshoes to an Eskimo.
Users continue to avoid network-based block virtualization like the plague. Yet what I can't understand is why you would implement a storage area network (SAN) without it. It's akin to implementing a WAN without a routing table.
I began life in a small Canadian city across the border from Michigan. Two doors down lived a teenager named Greg, who liked to work on cars. With a pack of cigarettes rolled up in his T-shirt sleeve and a butt drooping from his lips, he would lean over the engine of his '54 Chevy and tell me about four-barrel carburetors and four-on-the-floor shifts. And he let on that chicks loved cars.
Hospital IT infrastructures form a complex transactional environment in which pulling applications and information together can be not just mission-critical, but also a matter of life and death.
- Technical Specialist - Software Asset Management VIC
- Information Security Consultant QLD
- Agile Scrum Master/Iteration Manager - Banking and Insurance VIC
- AWS DevOps Engineer - Brisbane QLD
- Senior Project Coordinator SA
- Presales Security Consultant WA
- Linux & Windows Systems Engineer - Brisbane QLD
- Program / Project Analyst VIC
- Multiple Hadoop Developers Canberra, Brisbane, Melbourne or Adelaide ACT
- Multiple Xamarin Developers VIC
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud