IT management - News, Features, and Slideshows
IT management in pictures
New England security group shares threat intelligence, strives to bolster region as cybersecurity mecca
The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats" and drive cybersecurity R&D in the New England region. Network World editor in Chief John Dix attended their most recent meeting in Boston and later tracked down ACSC Executive Director Charlie Benway and ACSC Board Chair William Guenther (CEO and Founder of Mass Insight) for a deep dive on the organization's goals.
By John Dix | 17 December, 2014 06:44
When NASA's new spacecraft, Orion, made its maiden voyage last week, it completed its successful 4.5-hour trip running on a 12-year-old processor and a computer that's far from state-of-the-art.
By Sharon Gaudin | 11 December, 2014 01:52
Google employees love their jobs more so than workers at any other big company in the United States, according to the 2014 Glassdoor Employees' Choice Awards rankings.
By Bob Brown | 11 December, 2014 01:23
Google is No. 1 among employees, according to Glassdoor's seventh annual Employees' Choice Awards.
By Ann Bednarz | 11 December, 2014 00:48
The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.
By Wael Noureddine, David Fair | 11 December, 2014 07:40
Neither snow, nor rain, nor heat, nor gloom of night can compare with the challenges currently facing the United States Postal Service. Email continues to have a crippling effect on the centuries-old agency: The volume of first-class mail, or stamped mail, plummeted by 2.8 billion pieces in 2013.
By Cindy Waxer | 09 December, 2014 02:45
In today's IT market, vendors tell users that engineered, converged and highly integrated systems deliver the greatest efficiency. But some users believe a heterogeneous environment is the best path to savings.
By Patrick Thibodeau | 04 November, 2014 09:36
Technology professionals are among today's most infamous whistleblowers. The list of those who have made headlines for exposing corporate or government skulduggery includes Shawn Carpenter, a network security analyst who blew the lid off a Chinese cyberespionage ring; Bradley (now Chelsea) Manning, who shared more than 250,000 classified State Department cables with WikiLeaks; and Edward Snowden, who leaked top-secret information about NSA surveillance activities.
By Cindy Waxer | 08 October, 2014 00:16
Whitepapers about IT management
To improve business processes and gain efficiency, its important to identify the signs that your ITSM solution is outdated, inefficient or both. In this paper we look at key questions'you should be asking, such as: • Is your IT staff still using time-consuming manual methods to address common service requests and IT requirements? • Does your organisation lack an automated Service Request Management (SRM) system? • Is your current ITSM solution able to support all your IT reporting and information needs?
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Application Aware Network Performance Management (AANPM) Defined Business critical applications and services are in a constant state of change. Whether expanding to support new users and features, migrating to cut IT costs, or evolving to support BYOD, these systems put an increasing strain on the network and server infrastructure
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright