Talk about disruptive technologies. Despite being widely available for only a few years, Web 2.0 tools, such as WYSIWYG blogging platforms, wikis, social networks, RSS and social bookmarking sites have had a tremendous impact on the way millions of people think about and use the Internet. The term “Web 2.0”
Advocates of software configuration management tools and techniques tend to resort to metaphor when describing why, once adopted, IT organizations can’t live without them. By far the most frequent comparison is to the assembly line popularized by Henry Ford (but not invented by him, as it is widely believed). Before
Wouldn’t it be a great idea if an enterprise’s IT resources could be linked and reused, enabling businesses to respond more quickly and cost-effectively to changing market conditions? That’s the theory behind service-oriented architecture (SOA) and, in theory, systems developed according to SOA principles promise new levels of flexibility. In
As a hosted electronic data exchange company, SPS Commerce in Minneapolis, Minn., is in the business of connecting the software it creates to applications its customers use every day. When the company recently outgrew some of its own systems, it was in a unique position of living its own customers’
Redundancy is routine in the constant scramble to keep a conventional enterprise network functioning. But the wireless infrastructure is often ignored, leaving enterprises vulnerable to malicious attacks and network failure. No longer a hot-spot sideshow, wireless is on track to become the primary enterprise network sooner than you might think.
Server migrations come in just about every size, shape and variety — you can change operating systems, hardware platforms, vendors or do any combination of the three. But whether you seek to increase capacity, upgrade to the latest technology or standardize on a particular hardware or software platform, the ability
They are the best of tools and the worst of tools. Mobile computing devices can support the workforce out in the field or make your most sensitive company secrets public knowledge. The only way to simultaneously unleash your workforce and rein in company threats is to control the risks. Many
For IT professionals, certifications in technical areas serve as standard career currency. But even the most gilt-edged diplomas may no longer guarantee advancement. To reach the upper levels of the IT organization, training time is better spent sharpening interpersonal and project management skills. According to an IT skills research survey
After close to two decades — a lifetime in information technology — the traditional corporate wide-area network (WAN) may be headed for the endangered-species list. The usurper: Internet-based virtual private networks (VPNs). Instead of depending on dedicated leased or owned lines, VPNs use a variety of technologies to carry data
Managing data effectively has always been a major challenge for businesses. How do you capture it? Store it? Process it? Access it? What do you do with it once its immediate usefulness to your organization is gone? And, naturally, how do you accomplish all this at the lowest possible cost?