Quantcast
Channel: InformationWeek
Browsing all 36 articles
Browse latest View live

IT Manager's Guide to Managing Personal Devices in the Enterprise

You can’t avoid it any longer: Developing a strategy for managing and securing employees’ personal mobile devices. iPhone and Google Android devices are joining BlackBerry, Symbian and Windows Mobile...

View Article



The Value and Importance of Code Reviews

Did you know that most code reviews are conducted in an ad hoc fashion, don’t always include the right people, and fail to take advantage of the latest tools and technology? That’s according to new...

View Article

Mobility Management for Dummies Guide

These days, most business is no longer done in the traditional office. It's being done wherever you interact with customers or your employees are located. This presents an opportunity for you to gain a...

View Article

Agile Dedicated Teams: How to Make Outsourcing Software Development More...

Acceptic provides this report on how to make relations with IT providers more safe and reliable and at the same time profitable enough. A way to provide a win-win outsourcing strategy may be found in...

View Article

10 Ways To Keep Hackers In Check

The white paper was authored by Marsel Nizam, head of Web security development at Bitrix and supervisor of the development of the PRO+PRO security framework undergirding the company’s flagship...

View Article


A New Scalable Approach to Data Tokenization

This is a new approach to tokenize data that eliminates challenges associated with standard centralized tokenization. Particularly in high-volume operations, the usual way of generating tokens is prone...

View Article

Enabling Foreign Military Sales With the Acalis Secure Processor

A toughening regulatory climate has made the process of exporting defense articles more challenging. Earlier this year, Secretary of Defense Robert Gates announced initiatives to overhaul export...

View Article

Secure Boot Requirements and Capabilities in Embedded Systems

The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection...

View Article


New Data Protection Strategies

As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and...

View Article


Managing a growing threat: an executive's guide to Web application security

More and more companies are relying on Web-based applications to provide online services to their employees, to support e-commerce sales and to leverage portals. All of these applications are designed...

View Article

ITIC 2009 Global Server Hardware and Server OS Reliability Survey

The ITIC 2009 Global Server Hardware and Server OS Reliability Survey polled C-level executives and IT managers at 400 corporations from 20 countries worldwide. IBM AIX UNIX running on the Power or P...

View Article

Using cloud technology to manage your availability, data and overall resiliency

Your business is challenged with meeting the demand for continuous availability while also effectively managing enormous amounts of information that continue to grow, much of it online, and often with...

View Article

Planning and designing for smarter cities

Infusing intelligence into the way cities work. The interconnected nature of people, resources and environments is driving a revolution in how and where people live. By 2050, city dwellers are expected...

View Article


Four key strategies for enabling innovation in the age of smart

On a smarter planet, intelligence is infused into the products,systems and processes that comprise the modern world. Theseinclude the delivery of services; the development, manufactur-ing, buying and...

View Article

Spam 2011: Protection Against Evolving Threats

2011 anti-spam email security whitepaper. Today's enterprise anti-spam solutions typically deliver 95% effectiveness. Unfortunately, that's not good enough. A border-line attack that gets through a 5%...

View Article


Insights from the Global CIO Study - Midmarket Perspective

How are technology leaders adapting to the change and complexity that mark today's economic landscape? Read this white paper to identify the 4 patterns, or mandates, employed by CIOs when leveraging...

View Article

Neustar revamps SiteProtect DDoS strategy; targets service provider partners

"It may just seem like DDoS attacks don't exist at all." Find out why Tier1 Research gives the thumbs-up to SiteProtect-Neustar's cloud-based DDoS mitigation solution. Get a knowledgeable third party's...

View Article


Security Automation: Connecting Your Silos

For enterprises, managing security in today's ever-changing technology landscape is like being a farmer: it's all about managing your silos. Most IT organizations deploy many unique technologies from...

View Article

Building Cloud-Optimized Data Center Networks

This white paper reviews the impact of cloud computing on data center networks and describes HP's approach to building simpler, more secure and automated networks that fully meet the stringent...

View Article

How you build a secure network and growth ready network that is as agile as...

Learn how you build a secure network and growth-ready network that is as agile as your business. With a growth-ready network, small business can put new technologies to work on their schedule - and the...

View Article
Browsing all 36 articles
Browse latest View live




Latest Images