IT must implement an effective, mature method of change management or experience significant downtime and negative impact on productivity and profits.
Mainframe shops continue to look to Big Iron for increased operational efficiency and lower costs.
Almost all IT shops say that boosting energy efficiency is a clear priority, but comparatively few are actually spending money to do it
Just how favorably does Microsoft's Hyper-V compare to established products from VMWare, Virtual Iron, and Citrix?
Expect PSI's technology to pop up elsewhere -- perhaps in a low-end POWER-based mainframe
A security researcher's speculation about a DNS flaw ignites another firestorm for full and responsible disclosure
Microsoft seems serious about SaaS. If so, SaaS -- often seen as a disruptive technology -- might ultimately become a major disruptive market force.
Thanks to this month's DNS vulnerabilities, a lot of patching will be taking the time of DNS administrators. In fact, it might even seem like 2002 all over again.
Given the nature of technology and of business economics, are we ready for a storage revolution?
HP's POD is innovative and visionary, analysts say. In a world chock full of both innovation and vision, that's saying something.
Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.
We discuss the types of de-duplication and what meaningful criteria should be used to evaluate competing approaches and products
If you're in the market for a non-mainframe mainframe replacement, HP might have just what you need….
If Green Software is to have an impact, the software industry as a whole needs to get onboard
CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
The enterprise OS-scape could experience disruptive shocks during the next five years
Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?
A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
Why the threat of theft-from-within is keeping enterprise CIOs up at night
When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut