The view from the top of IT with TechWorld Editor Rohan Pearce
Among the many expectations for IT in 2014, Ethernet is projected to broaden its penetration in the metro area and the WAN. The ubiquitous technology will become further entrenched as a broadband access, cloud interconnect and wide area medium, further distancing itself from legacy TDM services. Here are eight predictions for Ethernet in the New Year, from service provider Comcast Business Services:
By Jim Duffy | 06 December, 2013 15:45
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
By Ellen Messmer | 05 December, 2013 22:18
Ah, December – it's cold as hell, everyone's going berserk from stress about visiting relatives and getting presents for the kids, and it gets dark at about 4 p.m. "Happy" holidays!
By Jon Gold | 05 December, 2013 20:12
While you have undoubtedly heard all the gloom and doom stories regarding individuals using personally owned devices or personally controlled cloud services like Dropbox, SkyDrive, Google Drive, Idrive, Evernote and similar services, don't forget the law of unintended consequences.
By Alan Brill, Senior Managing Director, and Jonathan Fairtlough, Managing Director, Kroll | 05 December, 2013 16:12
Picture this: You're sitting down
By Patrick Miller | 14 January, 2011 01:11
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
By Jon L. Jacobi | 10 December, 2010 02:33
Given the importance of telephone systems, refreshing the technology can be daunting. However, for small and midsized businesses who consider upgrading from a PBX to VoIP, the benefits are clear and, with proper planning, the implementation is not very frightening. Consider these three steps:
By Sheena Finnegan, Cisco Presales Engineer, CDW | 30 September, 2010 08:17
One of the key challenges confronting potential users of software-defined networking is discerning the specific value of particular SDN controllers. Controllers, after all, play critical role as the key arbiter between network applications and network infrastructure.
By Ethan Banks | 02 December, 2013 13:54
Personal coach Kelly Walsh says some initiatives with the 'work/life balance' label are actually counterproductive.
By Jamie Eckle | 02 December, 2013 11:33
As a dad of three youngsters, one of my favorite categories in the holiday gift guide is seeing what technology-related fun we can dig up and play with. Here our a bunch of our favorite toys and silly geeky things that will keep your kids (or the kid in you) entertained for weeks, months or even years.
By Keith Shaw | 18 November, 2013 12:28
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.