Editors' Picks
-
A cost-driven view of cloud data storage
Cloud storage costs can be a blow to an enterprise's cloud adoption plans. These strategies can help you line up storage options to your advantage.25 Sep 2012
-
IT evaluates options as Google Apps Internet Explorer 8 support ends
Google says older browsers don't have the chops to support Google Apps anymore. IE8 and Windows XP shops may want to choose a new browser or OS.19 Sep 2012
-
Dell cloud storage plans remain hazy
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.14 Sep 2012
-
The power of social networks and Generation Facebook strategies
The rise of Generation Facebook means that new rules must be applied to managing and empowering employees via social networks; here are a few to start.13 Sep 2012
-
Should CIOs be responsible for social media best practices?
Should CIOs be involved in social media roles within their companies? These social media best practices for CIOs may surprise you.12 Sep 2012
-
Schema.org site aims to standardize tags for Web content managers
Schema.org is a group working toward a standard for HTML tags to help Web content managers develop metadata for better search results across the Web.11 Sep 2012
-
As summer ends, time to dust off the BYOD policy
This week we point the SearchCIO.com Searchlight on why you might need to update your BYOD policy and another argument for focusing on mobile app development.31 Aug 2012
-
The future of email: Collaboration experts on new social media tools
Enterprise collaboration experts give their opinion on the future of email and email management in the face of new social media tools.29 Aug 2012
-
Something to tweet about: Social media skills help pay the bills
In this week's roundup we bring you a favorable forecast for the digital economy, reasons to sharpen your social media skills and more.17 Aug 2012
-
Google Pwnium hacking contest backed with $2 million in rewards
The search engine giant is doubling its payout when it holds its Pwnium 2 hacking contest in October at the Hack In the Box conference in Malaysia.16 Aug 2012
-
Strong passwords are no use against social-engineering iHack
CIOs try to stop hackers through security best practices such as two-factor authentication, but social engineering fueled a massive iHack.09 Aug 2012
-
Will BMC buy Puppet Labs for DevOps?
Puppet Labs and Opscode are tightly associated with the DevOps movement, and BMC is shopping for DevOps tools. A BMC-Puppet acquisition is possible.07 Aug 2012
-
OpenFlow tutorial for cloud providers
In this OpenFlow tutorial, networking expert Tom Nolle shows how OpenFlow can be a competitive advantage and outlines steps for providers to test it.31 Jul 2012
-
Top 10 cloud-based file-sharing terms you need to know
There are tons of cloud-based file-sharing definitions to keep track of. Our guide to these top cloud terms will help keep IT from getting lost in the storm.30 Jul 2012
-
Are SEO services a good addition to your line-card?
Providing SEO services to SMBs is a good business opportunity for VARs, because an optimized website can bring customers a lot more business.25 Jul 2012
-
Female CEOs like Marissa Mayer set an example for women in technology
Women in technology have a tough road ahead of them, even as female CEOs. What Marissa Mayer means for the future of equal opportunity tech.19 Jul 2012
-
Competitors, observers sound off on Microsoft-Yammer and SharePoint
Industry watchers and competitors see Microsoft’s purchase of Yammer as meaning everything from validating their approaches to enterprise social collaboration to helping SharePoint play catch-up.09 Jul 2012
-
Making sense of the cloud API war
As Google enters the IaaS market, enterprises have yet another cloud API choice to make. Yet, taking a wait-and-see-who-wins approach could cost them.05 Jul 2012
-
Google delivers IaaS cloud without Windows support
Google's IaaS platform will compete with Windows Azure and AWS, but a major limitation may prevent enterprises from adopting Google Compute Engine.02 Jul 2012
-
Google detects 9,500 new malicious websites daily
Malicious sites discovered via Google’s Safe Browsing effort include compromised websites and others designed for malware distribution or phishing.20 Jun 2012
Network Management Strategies for the CIO