Steve Ulfelder is a freelance writer in Southborough, Mass. To comment on this story, write to email@example.com.
Cloud computing, Desktops and laptops, Email and messaging, Green computing, Data storage, Mobile technology, Networks, Operating systems, Remote connectivity, Server management, Systems management, Virtualization, VoIP and unified messaging
Business process management, CIO and IT salaries, IT careers, Contract and legal issues, Cost-cutting tips for midmarket CIOs, IT and business alignment, IT project and portfolio management, IT spending and budgeting, IT staff development and retention, IT training and certification, ITIL and ITSM, Leadership and strategy, Outsourcing, ROI, Vendor selection and management
The results of our IT Salary and Career survey are in. See how your salary and career goals compare with those of your peers.
Big data technologies that snag VC dollars, the startup showdown, 'data curation at scale' and #FiveTechHorrors: The Data Mill reports.
AIIM President John Mancini talks about the right way to experiment with big data and why the most valuable CIOs are also the most vulnerable.
Application performance monitoring has proven beneficial to several areas of IT quality assurance, but can it be trusted with ensuring compliance?
Vulnerability assessment tools can help enterprises detect and eliminate security threats early on. Here are some of the newer products on the market.
In this ARMA 2013 video Q&A, ARMA International's Diane Carlisle discusses how modern technology poses new records management strategy challenges.
Hospitals are thinking out of the box and entering into partnerships with independent physicians to benefit both parties.
New VMware-, Microsoft-hosted healthcare desktop virtualization models create efficiency for health IT buyers.
Exclusive interview: Acting National Health IT Coordinator Jacob Reider, M.D., discusses how the ONC decided to delay meaningful use stage 3.
Jon Toigo explains how to determine what data should be archived and the most efficient way to migrate it for long-term storage.
Jon Toigo offers insights on storage options for deep archives, and the ways they affect data integrity and potential technology issues.
Archival storage options are expanding, getting more resilient and less costly. Find out which technologies are making an impression.
This year was busy for the cloud market, with acquisitions and new products. Our experts weigh in on what all this means for 2014.
Cloud computing performance is in high demand among customers of Amazon Web Services, which has sold out of new C3 instances.
AWS reigns king in the IaaS market; however, the PaaS market is muddier. David Linthicum discusses this and cloud performance issues in this podcast.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
A first-class IT staff is hard to find and keep, but convincing them to stick around is a necessary investment for a successful business.
These tips help answer common questions that enterprises will come across when working with searches in SharePoint.
Being an IT project manager isn't easy, but you can improve your information security skills and knowledge to make your job easier.