Gartner says that its clients have started planning to migrate from Unix. For some of them, it may take two or three years, and for others, five years. A few may still be running Unix 10 years from now, but nonetheless, Gartner believes the operating system is on a path to insignificance.
Dell will start selling systems early next year that run Red Hat's version of the OpenStack open-source cloud platform.
The "Internet of Things" is continually gaining momentum, with M2M (machine to machine) communication pegged as the next major development.
When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with. Here are seven ways to beat the monsters.
Before rushing into allowing employees to do their jobs on their personal devices, organizations need to diligently address the unique risks of that practice, cautioned a report by an international cybersecurity information organization.
A new survey reports that 70 percent of companies believe BYOD will or already has improved their work processes and 59 percent believe they would find themselves at a competitive disadvantage without BYOD.
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
Moving to an as-a-service computing model is inevitable and the discussion across enterprises is no longer just about risk but rather the speed by which services can be delivered to achieve competitive advantage.
A steady increase in corporate purchasing through the first three quarters of the year hints that enterprises are already rethinking how far BYOD programs will be allowed to expand, according to Strategy Analytics.
Many organisations have no formal plan for coping with DDoS attacks, lack up to date network maps, and probably depend on old technology to defend against the threat, a survey by Corero Network Security has suggested.
Cloud adopters face serious risk in the next two years because of the strong possibility that their provider will be acquired or forced out of business, the research agency says.
"We're seeing a significant amount of traction today in the hybrid world," said Kerry Bailey, an HP senior vice president for HP cloud services.
Dell Software has introduced a suite of software and services for enterprise mobility management, including a "secure workspace" for mobile devices that lets enterprise IT managers separate work from data apps.
Oracle has launched the fifth version of its Exadata database appliance, claiming the release provides in many areas double the performance of previous-generation machines.
Businesses are moving fast to address the demand for both employee- and customer-facing mobile apps. However, there is a danger in rushing. Here are five ways to avoid pushing out a mobile app too soon.
Being able to lock your mobile device is important because, in many cases, it's your first line of defense. It may not be the strongest form of security but it's a start until mobile device management measures like remote wiping are put into play.
IT managers facing the task of explaining the business value of IT to the C-suite don't necessarily have an easy time of it. But eBay believes it has fixed this problem with a metric that translates IT resources into key business metrics
The ever-increasing complexity of data about IT environments is making it increasingly difficult for organizations to make effective IT decisions.