BPM, Budgets, Careers, Contracts, Cost-cutting, Governance, ITIL and ITSM, Leadership, Managing cloud computing, Offshoring, Onshoring, PPM, ROI, Salaries, Staffing, Training/Certs, Vendor selection, Verticals
Learn about the benefits of HP Enterprise Services with these resources covering cloud computing, mobility, data growth challenges and more.Click Here
Learn how various CIOs have tackled the challenge of building and implementing a secure data governance strategy suitable to their specific business models.Click Here
Learn about the impact of cloud technology on IT departments today and in the future and find out if your business is prepared with these tools, white papers and videos.Click here
Learn how CommVault's big data management tools can help simplify the challenges IT organization face trying to keep up with the demands of rapid data growth.Click Here
Access the white papers and videos in this section to discover how ServiceNow’s IT Service Management and custom application creation tools can enable you to transform your entire business.Click Here
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data.
Despite an increased focus on data security protection, mobile application vulnerabilities are still often overlooked by both businesses and consumers.
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
Medical imaging vendors showcased new IT systems, as prospective users roamed the bustling show floor at the RSNA 2015 conference and attended educational sessions.
RSNA 2015 spotlights radiology innovation in cloud, analytics and 3D printing, said Rasu Shrestha, M.D., chair of the RSNA Scientific Program Radiology Informatics Subcommittee.
PatientKeeper, an EHR overlay software platform owned by hospital chain giant HCA, aims to simplify physician workflow and boost EHR usability for doctors.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
Facial recognition, fingerprint sensors and other advanced mobile device authentication technologies are the future of smartphone, tablet and Internet of Things security.
Microsoft added new capabilities to its Enterprise Mobility Suite that may give IT shops paying for other EMM platforms reason to make a switch.
With built-in Office and a keyboard, Microsoft's Surface tablet is geared toward the enterprise. Now, the Apple iPad Pro stands up to the latest version of Microsoft's device, the Surface Pro 4.
While virtualization, networking, IT management, and backup and storage remained in the top-five list of IT tasks again this year, another area crept up the list.
A timeline of HP through the years shows the defining moments that ultimately led to the split into HP Inc. and Hewlett Packard Enterprise.
After a few humdrum years, server architectures are in for big changes to close out the decade.