Michael Finneran, Mar 8, 2013
Yes, say most respondents to our UC survey who’ve done ROI studies. But the message isn’t getting out. Here’s how CIOs and providers can put stalled initiatives back on track.
Michael Finneran, Nov 18, 2011
The good news: The percentage of users who've deployed and are using UC jumped six points, to 36%, since our 2010 survey, and the number of "fence sitters" is down, too. The not-so-good news: For 65% of those who have deployed or plan to do so, UC currently reaches 50% or less of the employee base. What's the holdup?
InformationWeek Staff, Jun 18, 2013
Optimization And The Feds -- Data Center Decisions
InformationWeek Staff, Jun 17, 2013
Focus On Fundamentals -- What The Numbers Reveal
| Read Report » | 960 KB
Kurt Marko, Jun 13, 2013
As smartphones and tablets displace PCs as the client device of choice for more workers, software distribution and management strategies must adapt. It’s a pull, not push world. Time to get an enterprise app store open for business.
Debra Donston-Miller, Jun 12, 2013
When it comes to SMBs, not everything is relative — especially when it comes to security. SMBs run the same kinds of risks and face the same kinds of bad guys that bigger companies do. Unfortunately, SMBs don’t have the same kinds of resources, so they need to get creative when it comes to stretching their security budget dollars. In this Dark Reading report, we provide some recommendations for getting the most bang for your security buck.
InformationWeek Staff, Jun 12, 2013
Don't Confuse Big Data With Storage -- Moving Legacy Apps To The Cloud -- VMware Users Gain Bluelock Recovery Option -- How University Of Oklahoma Protects Records From Disaster -- Don't Trade High Availability For Flash Performance -- Rackspace Launches Global OpenStack Expansion -- EMC Merges High Availability, Disaster Recovery Into One
InformationWeek Staff, Jun 10, 2013
Data Center Decision Time -- 5 Lessons From Government Delays -- Edelman CIO Shares His Game Plan -- What's Ailing IT
| Read Report » | 4 MB
Kurt Marko, Jun 10, 2013
Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it's the latter.
| Read Report » | 515 KB
Brad Causey, Jun 4, 2013
In today’s enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what’s the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? In this Dark Reading report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.
Kurt Marko, Jun 4, 2013
Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it’s the latter. Worse, we often lack agility, 67% say application and hardware philosophies frequently or occasionally conflict business demand, and just 27% say a private cloud is a high priority. Meanwhile, planned use of colocation facilities is up an anemic 5 points over last year.
Robert Lemos, Jun 3, 2013
End user security requires layers of tools and training as employees use more devices and apps.
| Read Report » | 825 KB