Michael Finneran, Mar 25, 2013
Many UC projects are stuck in neutral: Only 38% have deployed, up just two points from our 2011 survey, and 31% of these respondents have rolled UC out to less than 10% of their user bases. Here’s how to get out of the rut.
Michael Finneran, Feb 28, 2012
Unified communications today encompasses so much more than it did even a year or two ago. For IT teams with splintered strategies, the challenge is to align a UC project with what vendors are offering, what the business needs and what's realistic given budgetary constraints. Get past semantics and start focusing on how we get collaboration technology--whatever you want to call it--into your users' hands.
InformationWeek Staff, Jun 18, 2013
Optimization And The Feds -- Data Center Decisions
InformationWeek Staff, Jun 17, 2013
Focus On Fundamentals -- What The Numbers Reveal
| Read Report » | 960 KB
Kurt Marko, Jun 13, 2013
As smartphones and tablets displace PCs as the client device of choice for more workers, software distribution and management strategies must adapt. It’s a pull, not push world. Time to get an enterprise app store open for business.
Debra Donston-Miller, Jun 12, 2013
When it comes to SMBs, not everything is relative — especially when it comes to security. SMBs run the same kinds of risks and face the same kinds of bad guys that bigger companies do. Unfortunately, SMBs don’t have the same kinds of resources, so they need to get creative when it comes to stretching their security budget dollars. In this Dark Reading report, we provide some recommendations for getting the most bang for your security buck.
InformationWeek Staff, Jun 12, 2013
Don't Confuse Big Data With Storage -- Moving Legacy Apps To The Cloud -- VMware Users Gain Bluelock Recovery Option -- How University Of Oklahoma Protects Records From Disaster -- Don't Trade High Availability For Flash Performance -- Rackspace Launches Global OpenStack Expansion -- EMC Merges High Availability, Disaster Recovery Into One
InformationWeek Staff, Jun 10, 2013
Data Center Decision Time -- 5 Lessons From Government Delays -- Edelman CIO Shares His Game Plan -- What's Ailing IT
| Read Report » | 4 MB
Kurt Marko, Jun 10, 2013
Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it's the latter.
| Read Report » | 515 KB
Brad Causey, Jun 4, 2013
In today’s enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what’s the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? In this Dark Reading report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.
Kurt Marko, Jun 4, 2013
Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it’s the latter. Worse, we often lack agility, 67% say application and hardware philosophies frequently or occasionally conflict business demand, and just 27% say a private cloud is a high priority. Meanwhile, planned use of colocation facilities is up an anemic 5 points over last year.
Robert Lemos, Jun 3, 2013
End user security requires layers of tools and training as employees use more devices and apps.
| Read Report » | 825 KB