Skip the navigation

More Data Center In Depth

4 Qualities to Look for in a Data Scientist

Every business, it seems, needs a data scientist, but not everyone knows what to look for. The four qualities of a good data scientist described here will help you first write a job description and then evaluate candidates for your data scientist vacancy.

How to create awareness of the insider threat

One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities.

The Mainframe Isn't Dead, and Neither Is the PC

The mainframe was supposed to go extinct decades ago, but it's abundant in many habitats. Same goes for the PC, which seems to have adapted for survival better than once thought. Both the mainframe and the PC offer evolutionary advantages that newer, more sophisticated species still struggle to match.

How Big Data Helped the Norman Rockwell Museum Grow Revenue

With the help of DigiWorksCorp, the Norman Rockwell Museum leveraged its transactional data and big data analytics to increase second-time purchasers by 150 percent and revenue by 49 percent.

Think Deleted Text Messages Are Gone Forever? Think Again

A former federal prosecutor and cybercrime expert tells CIO.com how IT departments can retrieve text messages that the user thought were deleted months or even years ago. As more litigation and investigations turn on the content of texts, every CIO needs to know how to find the smoking gun.

Virtual machine (VM) security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions.

Whittle down application sprawl

Getting rid of old, unsecured or unused software and services is not easy. Do it correctly, though, and you can save IT time and money.

First look: Docker is a better way to deploy your apps

A long time ago, a computer program was a stack of punch cards, and moving the program from computer to computer was easy as long as you didn't drop the box. Every command, instruction, and subroutine was in one big, fat deck. Editors, compilers, and code repositories have liberated us from punch cards, but somehow deploying software has grown more complicated. Moving a program from the coding geniuses to the production team is fraught with errors, glitches, and hassles. There's always some misconfiguration, and it's never as simple as carrying that deck down the hall.

12 Ways to Disaster-Proof Your Critical Business Data

How can you keep critical data safe when disaster strikes? There is no one magic answer, but there are steps your business can and should take to protect important files and applications in the event of a disaster.

Premier 100 IT Leader: Christine Shimizu

By focusing on customer needs, this IT leader helps grow the business.

Facebook Open Sources Thrift Protocol ... Again

After more than six years of internal development of its branch of the cross-language framework that powers its internal services, Facebook has released that branch to open source and hopes to work with the Apache Thrift community to incorporate the work.

Review: PathSolutions solves the network monitoring maze

PathSolutions' TotalView provides a path-oriented view into network problems and acts as a superb companion to your traditional network monitoring system

How to rethink security for the new world of IT

Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently

How to set up Microsoft's Web Application Proxy

Implementing WAP involves a lot of moving pieces; here's what admins need to know for a successful rollout.

MapR's New Hadoop Distribution Promises No-Risk Updgrade

MapR's latest Hadoop distribution includes support for Hadoop 2.2 with YARN, but is also backward compatible with the MapReduce 1.x scheduler, promising organizations a risk-free upgrade path to the latest Hadoop architecture.

7 Reasons Not to Use Open Source Software

Businesses of all sizes embrace open source software and the benefits it can bring. Sometimes, though, choosing proprietary software makes better business sense. Here are seven scenarios when it pays to pay for your software.

Businesses Spending on Big Data Marketing but Not Hiring for It

Marketing organizations are continuing to increase their budgets for big data marketing initiatives, but most are focusing on technology, not talent. That could be a costly mistake.

Nutanix NX-3000 review: Virtualization cloud-style

Nutanix Virtual Computing Platform brings resilient, cloud-like server and storage infrastructure to traditional virtualization deployments

Understanding How SDN and NFV Can Work Together

As software-defined networking and network function virtualization begin to take hold in the enterprise, it's worth examining each concept to see how they complement each other. The end result: More generic network hardware and more open software.

The Open Source Rookies of the Year Awards

, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the