Best practices News
February 05, 2018
When we surveyed several hundred IT professionals on the topic of All-Flash Arrays, one thing that came out was just how broad was the chasm in thinking between those whose organisations already ...
February 01, 2018
A new study on cloud data security provides insights into the shaken confidence in the cloud. Despite its increased use, payment and customer data still appears to be at risk.
January 29, 2018
Europeans will in future be able to bring US-style class actions for (alleged) privacy violations, instead of having to sue individually and expensively. It’s thanks to a little-known clause of the ...
January 26, 2018
This is a guest post for the Computer Weekly Developer Network written by Eran Kinsbruner in his role as lead technical evangelist for Perfecto. Perfecto is known for its 'continuous' (as in ...
Best practices Get Started
Bring yourself up to speed with our introductory content
If you get clumsy with AWS security, you can put your whole business at risk. Be wary of these common errors, and implement best practices to secure your workloads. Continue Reading
It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills the need -- but you'll need to navigate it first. Continue Reading
Set up and operate a VM network using proven strategies to ensure security and performance. With a little planning, virtualization admins can avoid potential issues down the road. Continue Reading
Evaluate Best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new breed of software tools is driving DevOps processes deep into the persistence layer, as database automation and continuous deployment come together. Continue Reading
Microsoft's SharePoint remains an in-demand business platform for organizations all over the world. Combined it with IoT to reap even more benefits. Continue Reading
The ability for businesses to use 5G wireless networks is closer to becoming a reality as carriers continue to deploy 5G trials across cities in the U.S. and globally. While the technology that promises faster broadband speeds and enhanced data capacity is still in precommercial stages, 5G wireless networks are expected to transform how business is conducted around the world.
In this issue of Network Evolution, find out how enterprises are exploring of the possibilities of 5G wireless networks and how they can prepare for them.
Beyond 5G wireless networks, this issue looks at software-defined networking, and network managers share their reasons for choosing smaller SDN vendors instead of major providers like Cisco or VMware. A variety of software-based networking options are attracting enterprises that want to start their SDN evolution.
In addition, the ongoing availability of new business collaboration tools and features offers end users multiple options to choose from, which can lead to overlapping features. Enterprises are faced with similar applications for things like email, messaging, video or conferencing, and IT managers have begun exploring options to consolidate these tools into a single platform. Here we look at best practices to develop a plan to help deploy unified communications (UC) tools and improve collaboration across the enterprise.
Finally, in this month's Subnet, see how Durham County, N.C., is using network automation to create an efficient, seamless network experience for IT managers and users.Continue Reading
Manage Best practices
Learn to apply best practices and optimize your operations.
OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools. Continue Reading
A lack of proper testing, communication and insight into best practices all contribute to application security shortcomings. Kevin Beaver explains how to manage the risks. Continue Reading
Load balancing and failover capabilities help optimize performance and achieve resiliency in your virtual infrastructure. Learn how NIC teaming provides both functionalities. Continue Reading
Problem Solve Best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Bsquare's Dave McCarthy offers five key factors to consider when building IoT reports and visualizations to make it easier to understand what you and your peers want to learn from your connected ... Continue Reading
The indirect licensing access issue is confusing to many SAP customers, and the company's efforts to explain it have not been fully successful, according to industry analysts. Continue Reading
Ransomware recovery is a complex task. Make sure you're doing all the right things, from protecting unstructured data to testing your recovery capabilities. Continue Reading