Get started

Editors' Picks

  • Audits could have compliance influence on HIPAA business associates

    Business associate audits make service providers open to HIPAA regulatory violations but may be a resource and budget boon for compliance officers.

  • Five reasons IT should get to know wearable tech

    IT should keep an eye on wearable devices -- the technology may enter your enterprise environment sometime in the future.

  • Docker

    Docker is an open-source initiative that enables a Linux application and its dependencies to be packaged as a container.

  • robojournalism

    Robojournalism is the use of software programs to generate articles, reports and other types of content. Sophisticated content generation programs rely upon a combination of artificial intelligence...

  • NASCAR slide

    A NASCAR slide is marketing lingo for a PowerPoint slide filled with logos. 

  • OpenZFS

    OpenZFS is an open-source file system and logical volume manager for highly scalable storage with built-in features such as replication, deduplication, compression, snapshots, and data protection.

  • microserver

    A microserver, also known as a server appliance, is a compact, less expensive, modular hardware platform designed to make installation and maintenance simpler than traditional enterprise-class rack...

  • Can problem-solving techniques foster change, IT organization success?

    Employing certain problem-solving techniques in the workplace might lead to better quality assurance and innovation.

  • RtOI (real-time operational intelligence)

    Real-time operational intelligence (RtOI) is an emerging industrial discipline that allows businesses to intelligently transform vast amounts of operational data into actionable information that is...

  • Customer nurturing technologies for the critical 80%

    Customer nurturing helps companies solidify relationships with existing customers -- who make up 80% of company revenue; new customers claim only 20%.

  • A strong information security program is a competitive gain, not just a cost

    In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it.

  • Do the terms HANA Enterprise Cloud, HANA Cloud Platform confuse you?

    If you're not sure about the differences between the SAP HANA Enterprise Cloud and the SAP HANA Cloud platform, you're not alone.

  • software substitution

    Software substitution is the use of computer programs to conduct tasks that have traditionally been performed by a human. The replacement of workers by software is an ongoing trend. Well-establishe...

  • There's still room for improvement during a live VM migration

    Live VM migration is a key part of virtualization, and it should continue to get better and become a bigger part of an IT admin's everyday operations.

  • mobile location analytics (MLA)

    Mobile location analytics is a method used by retailers to track the movements of shoppers throughout their stores.

  • embedded IT

    Embedded IT is the process of inserting information technology staff and expertise into other business units in order to quickly and more effectively identify and pursue new business opportunities ...

  • Oracle gets away from relational DB with NoSQL database architecture

    Robert Sheldon traces the roots of NoSQL, shows the important features of the Oracle NoSQL Database architecture, and describes its implementation.

  • Fibre Channel Arbitrated Loop (FC-AL)

    A Fibre Channel Arbitrated Loop (FC-AL) is a high-speed Fibre Channel (FC) topology that can connect up to 126 ports on one controller using a one-way loop or hub design.

  • Delivering virtual apps? Consider app streaming and remoting

    Virtual apps are easier to deliver than entire desktops, but they still require planning and management. Consider app streaming and remoting.

  • bit rot

    Bit rot is the slow deterioration in the performance and integrity of data stored on storage media. It is also known by the names bit decay, data rot, data decay and silent corruption.