Special Features

Trending Topics

Cloud computing has engulfed lots of IT, but one of the next untapped regions of the tech and business world is the industry cloud, focusing on vertical industries and more specialized applications. Learn why it's the next frontier in cloud.

As big data, the internet of things, and social media spread their wings, they bring new challenges to information security and user privacy. We examine the new challenges and how companies can best deal with them.

The rise of objects that connect themselves to the internet -- from cars to heart monitors to stoplights -- is unleashing a wave of new possibilities for data gathering, predictive analytics, and IT automation. We discuss how to tap these nascent solutions.

ZDNet and TechRepublic draw on their community of C-level executives and business thinkers to prognosticate where business technology is headed over the next 36 months. This includes advice, perspectives, and opinions on both creating and reacting to the future.

CES is a showcase for the tech trends that will shape the year ahead. Since consumer tech now has a big influence on businesses, we put the spotlight on the most important CES trends for companies to watch.

The Edward Snowden revelations have rocked governments, global businesses, and the technology world. When we look back a decade from now, we expect this to be the biggest story of 2013 and the one with lasting impact. Here is our perspective on the still-unfolding implications along with IT security and risk management best practices that technology leaders can put to good use.

Enterprise-focused startups have emerged as some of tech's hotbeds of innovation. We highlight how partnering with startups can help companies leapfrog competitors and we provide perspective on how to approach buying IT solutions from enterprise startups.

Software as a Service offers irresistible benefits for organizations of all sizes — from cost savings to scalability to mobile accessibility. We offer guidance on avoiding the pitfalls of the cloud and choosing your SaaS partners well.

Why do many boards leave IT security primarily to security technicians, and why can’t techies convince their boards to spend scarce cash on protecting stakeholder information? We offer guidance on how to close the IT security governance gap.

The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular