Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
Cloud computing on Linux, Linux high-performance computing and supercomputing, Linux server hardware, Linux virtualization, Linux backup and storage, Linux network administration, Open source projects in the cloud
TIA data center standards address cabling systems with performance, budget and future plans in mind. New concepts bear consideration as well.
IBM's z/OS Connect is a fresh way to tie in mainframe processing with Internet applications. See what it does and how it overlaps with existing software.
Stumped when it comes to buying the latest gadgets for geeks? Have no fear -- our experts are here with their wish lists to offer some suggestions.
2014 is coming to a close, but there were plenty of product and technology definitions that stood out this year, including 'vRealize,' 'containers' and more.
Puppet Labs offers one of the most popular automation tools and you can learn it on your own time, for free.
Many view Docker containers as a competitor to VMware, but the virtualization giant now supports it along with other container technologies.
As cloud evolves, new applications such as big data analytics and HPC enter the fray. What do these new apps mean for cloud's future and performance?
Artificial intelligence has grown in popularity with smart agents such as Apple's Siri. With the right planning, intelligent agents in the cloud top IT's wish list.
Cloud computing is the popular kid in IT, but security concerns keep it from being invited to enterprise parties. Help IT teams warm up to the new kid with these top security tips.
The MDOP 2014 suite includes changes in tools for remotely managing and restoring Windows, as well as new BitLocker Group Policy settings.
The Windows 8 registry is a key component of the OS that admins can use to disable background checks and other activities to make systems run faster.
Single sign-on lets users skip multiple logins but also threatens Windows 8.1 security. Fix the vulnerability in that OS and Windows Server 2012 R2.