CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
The enterprise OS-scape could experience disruptive shocks during the next five years
Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?
A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
Why the threat of theft-from-within is keeping enterprise CIOs up at night
When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut
The data center impact of the new POWER 575 systems that IBM announced last month could be nothing short of radical
Disputes between rival IT factions can stop an SOA project dead in its tracks
It may not be long before businesses differentiate themselves on the basis of security
Despite Sun’s poor economic showing recently, the atmosphere at last week’s JavaOne conference was surprisingly festive
IT shops don't always embrace application modernization as a means to ratchet up efficiencies. They're mostly looking to cut costs.
IBM touts its new iDataPlex Web 2.0 servers as nothing less than game-changing
Automation makes all the difference in a data center, which is why BMC, CA, HP, and IBM are spending heavily to get in on the action.
If Big Blue's new Power Express systems are harbingers of 'the future, users can expect ever-greater density and performance
Virtualization can be a boon to business continuity and disaster recovery planning -- provided you understand the risks
Outsourcers are increasingly trying to achieve greater contract flexibility and minimize overall risk. Here are the risks you should know about.
New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense
Increasingly, organizations are turning to IT outsourcing to enhance business outcomes instead of simply to control or reduce costs.
Sleeping laptops may be the next way hackers steal encrypted information