Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
Cloud computing on Linux, Linux high-performance computing and supercomputing, Linux server hardware, Linux virtualization, Linux backup and storage, Linux network administration, Open source projects in the cloud
Cloud networking shakes up network infrastructure management, such as how an enterprise handles SSL decryption.
Server managers detail their data center plans for 2014 and offer insights into the systems management and career challenges they face.
Our IT priorities survey offers a glimpse into data center managers' technology plans, their concerns and their focus for 2014.
VMware has been, and still is the virtualization market leader. But, it's facing challenges, not the least of which are coming from its own user base.
Hypervisors now make 100% virtualization possible, but just because you can doesn't mean you should. Find out what not to virtualize.
C-state and P-state both offer options for managing system power, but they are very different from one another.
VMware vCloud Director has already begun to meld into vCloud Automation Center. Find out what cloud software VMware will integrate next.
HP rolls out new CloudSystem for OpenStack-based private clouds, but IT pros say it's still uncommon to find such environments among enterprises.
Last-minute gadget shopping got you down? Let our experts guide you to the most sought-after geek gifts for the technically inclined.
Botnet infections are an increasing threat to enterprise IT security, so don't be caught catching up. These five steps can help with malware defense.
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8.
These five capabilities of Security Accounts Manager, which is built into Windows, can help IT manage and enforce enterprise password management.