Harried by legal, regulatory, or competitive concerns, organizations are increasingly paying much more attention to their desktop backup strategies.
Symform positions itself as the most clever and affordable take on online disaster recovery to date.
Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.
Oracle's move shakes up the virtualization status quo
Sun says its Nehalem product line is “significantly differentiated” from other Xeon 550-based systems in a very crowded market.
By trumpeting new energy and power-management features, Intel and its partners hope to make a business case for Xeon 5550.
A closer look at the components and best practices for success with your data loss prevention project.
Detailed tips and tricks for getting the most out of MySQL in the enterprise
A little imagination can be a great thing when it comes to planning for a disaster. The disasters we might encounter as IT managers are no different.
With ILM, Informatica says it has the answer for harried data management pros. Analysts caution that Informatica's strategy will take time to gestate.
In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
According to Gartner, cloud computing still has some maturing to do
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
Security vendors are stepping up their efforts to close the gap between security and operations
Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.
Data governance implementation should be the top priority for enterprises undertaking three initiatives.
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.