Recent compromises of smartcard data have exacerbated concerns about the technology’s privacy, security and standards (or lack thereof). Yet the promise of smartcards is too compelling to ignore. New technologies and applications prompt us to take a fresh look.
We look at the pros and cons of OpenFlow and SDN and how they stack up with existing options to simplify networking.
Apple, RIM, Google and other smartphone makers are adding near field communication capabilities to their devices for release in 2012. Enterprise mobility teams should be ready to advise business leaders on how to incorporate mobile commerce into the organization's plans.
Antivirus systems alone cannot fight a growing category of malware whose strength lies in the fact that we have never seen it before. Dark Reading examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it.
Infrastructure may be cool again thanks to SDN, but network guys aren't having all the fun: 48% of the 543 respondents to our latest State of Servers poll mix and match server vendors, and 40% are intrigued by rack-based designs, like the one being developed by the Open Compute Project. But it's not all fun and games, as 63% say high virtualization/consolidation ratios are stressing their gear.
The next steps in going virtual up and down the stack, from network to desktop: Automation and finally taking hypervisor security seriously. The two go together, because if you're going to trust production systems to run without human intervention -- a must for delivering IT services on demand -- you'd better be darn sure attackers can't gain control.
Avoiding budget surprises is a top priority for IT. Two main keys: Spend smart up front, then tightly manage enterprise software licensing and maintenance.
Apple’s latest smartphone ushers in a new hardware package paired with an updated OS. Here’s what enterprise IT teams charged with supporting employee mobility need to know about Maps, security, Passport vs. NFC, networking and more.
Our 2013 Big Data Survey shows we’re not lacking facts, figures or the tools to wrangle them. So why do just 9% rate themselves as extremely effective users of data? And how do we expect to improve when just 31% have a wide array of business users accessing information and just 20% plan to grow their dedicated analytics teams?
As email-borne exploits grow increasingly sophisticated, all the time and money spent shoring up back-end network access channels could be for naught. Here's how to defend against attacks that prey on your end users. The first step: Know what you're up against.
Want to accept credit cards without excess hassle and expense? With more smartphones incorporating NFC, it makes sense to consider new payment apps that deliver convenience for customers with reasonable fees for sellers -- two are even free. We run down systems from Dwolla, Intuit GoPayment, Kuapay, LevelUp, Square and Tabbedout.
Forty-seven percent of business technology pros we surveyed say staffing at their companies has increased over a year ago, and just 18% say it's decreased. The standout is app dev, with 25% of respondents putting it in the top two categories of growth. Find out what other skills are sought after and whether that demand translates into more hiring in this report.
For a technical position that's also close to the operations side and the end user, consider the role of application delivery specialist. Although definitions vary, it's a position in high demand from companies transforming their development approaches and deployment technologies, with 10% of delivery-focused survey respondents saying they plan to increase staffing in this area by more than 30% in the next two years. That's why only 21% expect to fill these positions easily.
While only 10% of respondents to our InformationWeek 2012 State of IT Staffing Survey involved with hiring or managing IT personnel anticipate increasing WAN staff over the next 12 months, 37% of those identifying it as one of the top two areas of staffing increase expect to bump up personnel by more than 10%. Read on for trends in compensation, hiring criteria, skill sets and training for an important but challenging specialty.
Just 8% of respondents to our InformationWeek 2012 State of IT Staffing Survey involved with hiring or managing IT personnel see demand staying flat vs. 38% who will increase staffing by more than 10%. Read on for trends in compensation, hiring criteria, skill sets and training for the IT industry's hottest specialty.
While 31% of respondents to our InformationWeek 2012 State of IT Staffing Survey citing public cloud as a top area for new hiring want to boost the number of employees with this expertise by 11% or even more, that may be easier said than done. In fact, 53% say required skill sets may be hard to find -- or even nonexistent. That opens up opportunities for IT pros with a mix of talents and a willingness to negotiate.
IT is forging ahead with mobile computing plans but may not be able to find the desired skills--or the budget to pay for them. While 15% of respondents to our survey say they plan to increase staff in the area of mobility in the next year, 38% of those who identify it as a top area of staffing increase say a shortage of workers is holding them back from adopting mobile tech, and 19% worry that salary demands will exceed their budget or that they won't be able to afford the people they need.
Forty-seven percent of companies expect an increase in IT spending in 2013 and just 18% expect a cut. But budget tactics aren't changing to recognize shifts in IT's strategic role, with just 22% saying their IT governance board has a major influence on budgets.
While 69% of respondents citing server, storage and data center engineering and management as a top area of planned staffing increase say hiring levels will rise 10% or less, these numbers belie a vibrant environment fueling demand for engineers with virtualization and cloud expertise and a knack for innovation. And, 61% say they pay for training, a nice perk.
With 10 Gbps Ethernet standard and 40 and 100 Gbps on the way, one big question is whether firewalls, intrusion-detection systems, packet analyzers and other monitoring systems can keep up. If not, your need for speed might prove deadly.
As enterprise IT gears up to battle mobility run amok, vendors are employing some sleight of hand, using a mix of acronyms to disguise few comprehensive offerings. We took the pulse of this hot area, asking 40 providers tough questions about cost, capabilities, deployment options and more. Our research shows little distinction between products that are designated as BYOD and those that are MDM, MAM or something else altogether. So now what?
Infrastructure-as-a-service lets companies focus on their core competencies, instead of on installing and maintaining computer hardware. But with so many vendors in the market, how do you know which one is the best fit for your company? We look at 9 IaaS providers and 10 services categories to help IT pros answer that question.
Most IT teams have synthetic monitoring of their websites down. Now it's time to extend that vigilance to client-server applications.
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place -- a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications.