IT management

IT management - News, Features, and Slideshows

News

  • How to get tough with your tech vendors

    Planning a purchase from a major IT vendor? In this still-tough economy, negotiating pros recommend being aggressive and creative, as well as analyzing your requirements first so that you don't buy more than you need and know where you can compromise.

  • How to recruit and hire Millennial tech employees

    The Millennial generation increasingly streaming into the workforce is less focused on money and more on being challenged and contributing to the larger good, preferably at a job where technology is important to the overall operation and where it's acceptable to chat with friends via instant messaging and Facebook.

  • CIOs say they're hiring again

    The technology employment outlook is slowly starting to improve, but the uptick in hiring has been modest and hasn't come close to making up for the IT jobs lost during the economic downturn of the past couple of years.

  • Meeting the new PCI wireless requirements

    Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats.

  • Coders must reprogram how they write for Wall Street

    As high-performance computing (HPC) becomes more important in helping financial services companies deal with a rising tsunami of data, there's growing angst on Wall Street about a dearth of skilled programmers who can write for multicore chip architectures and parallel computing systems.

  • Oracle gets cloud religion

    What a difference a year makes. Last September, Oracle CEO Larry Ellison launched into a tirade about the "nonsense" that cloud computing had become. The industry had gone haywire, he said, and slapped the buzzword on technologies that weren't really new at all.

  • Avaya CEO: How video will change business world

    Last Wednesday, Avaya, Inc. made a splash in New York City with a portfolio of new collaboration products, including the Flare Experience multimedia conferencing system, a new tablet designed to support the Flare software and the web.alive (stet) virtual reality meeting service, among other offerings. In the latest installment of the IDG Enterprise CEO Interview Series, IDGE Chief Content Officer John Gallant talked with Avaya leader Kevin Kennedy about the company's collaboration strategy, how the new products change the competitive battle with Microsoft Corp. and Cisco Systems, Inc., and what it's going to take to make video a part of everyday life for business users.

  • Hurd unveils Oracle's latest mega-machine

    Oracle co-President Mark Hurd ripped the curtain off Exadata Database Machine X2-8, the newest incarnation of the company's high-performance data processing systems, during a keynote address at the OpenWorld conference on Monday.

  • Hurd unveils Oracle's latest mega-machine

    Oracle co-President Mark Hurd ripped the curtain off Exadata Database Machine X2-8, the newest incarnation of the company's high-performance data processing systems, during a keynote address at the OpenWorld conference on Monday.

  • Ellison announces 'one big, honkin' cloud'

    Oracle CEO Larry Ellison unveiled his company's entry into the private cloud computing system battles on Sunday, upping the competitive stakes between Oracle and rivals like IBM and Hewlett-Packard.

  • IT slowly hiring back after layoffs

    WASHINGTON -- The IT industry shed employees last year at a much faster pace than they are now hiring them, but at least the industry is hiring.

  • Red Hat tops list of hottest IT security certifications

    Interest in IT security certifications is booming, as more U.S. companies tighten up the protection surrounding their critical network infrastructure and as a growing number of employees view security expertise as recession proof.

  • 10 steps to easier access management

    NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.

[]