IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?
20 Great Ideas To Steal In 2012
Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.
12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.
New England Patriots' Winning Technology Plan
IT pros from Boston's professional teams -- the Patriots, Celtics, Bruins and Red Sox -- met at Gillette Stadium to talk tech, the future of live sports, and how to deliver real-time, high-definition video to a crowd of 70,000.
CES 2013, it's a wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.
Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy.
More Information & Registration