Data Management


Terabyte Drives Have Arrived

In less than 18 months, perpendicular recording has gone mainstream. It is one of those little-noted technology innovations, but one that is extraordinarily important.

Compuware, IBM Loosen Their Purse Strings

Both Compuware and IBM notched a pair of mainframe-related acquisitions

Impressive Growth Ahead for Application Server Market

The application server marketplace isn’t the exclusive playground of J2EE and .NET: CICS is amply represented, market watcher IDC says

Big Blue’s Big-Iron Security Trump Card

IBM is pushing a retro database security model: bring it all back home to the mainframe, and trust the security and privacy of Big Iron

Enterprise IT: Five Predictions for 2007

The year was something of a mixed bag, milestone-wise. We offer five trends to watch in 2007.

Data Encryption: The Whole-Disk Option

For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.

Data Trends Foreshadow DBA Challenges, MS SQL Server Direction

More unstructured data and an emphasis on business intelligence will keep DBAs busy



How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Oracle Plays Both Sides of the Mainframe/Distributed Divide

Regardless of whether customers opt for Linux-on-zSeries or choose to abandon the mainframe altogether, Oracle stands to benefit

Productizing Storage Services the IBM Way

How do you help businesses better manage information and increase the performance of their database and storage-related infrastructures?

Storage Clusters and Beer: It’s All in the Hops

Is a software-only solution to storage manipulation on the horizon?

Next-Generation Storage: Low Cost Isn’t Enough

New vendors trumpet products with lower price tags, but if they lock you into a single source, what’s the point?

Protecting Remote-Site Data

EdgeSecure makes it easier to protect data stored in remote locations.

Management by Security Class

Sooner or later, technology to allow a true ILM was bound to come along.

Control Broker Technology: Enhanced Customer Service Through Direct Front-to-Back-End Integration

The advent of the Web marketplace has forced companies to reevaluate their approach to customer service strategies. Many organizations rely on customer relationship management software to provide a consistent experience for customers at all points of contact with the organization. But, this software does not provide access to back-end applications. A new class of software, control broker technology, could be the answer to bridging the gap.

Of Java and DB2: Using Java Database Connectivity and SQLJ

IBM has provided the OS/390 Java programmer with two access mechanisms to access DB2 data: Java Database Connectivity (JDBC) and SQLJ. Learn what will work best for you. Receive an overview of Java with DB2 in the OS/390 environment, view code snippets illustrating each access mechanism, and compare the strengths and weaknesses of JDBC versus SQLJ.

Come Into the Cold: Computer Output to Laser Disk System Saves 13,800 Hours in Access Time

Marsh & McLennan Companies Inc. needed to find a way to reduce the amount of time clerks spent searching through stored data in order to answer inquiries. The move from a microfiche-based storage system to a computer output to laser disk (COLD) system in 1996 saved the firm 13,800 hours per year in time, previously spent searching for payroll, benefits and human resources information.

Data Assets: Forecasting Large Data Warehouse Applications in a Banking Environment

The Bank of America knows that keeping a competative edge means continually analyzing customer needs. Its Enterprise Data Warehouse, a DB2 database used for data mining, helps them meet their business goals. Recently, the bank upgraded the CPU processor to support this important application. Learn what steps were taken, and the results of the process.

Wild West Tales of DR: Resiliency, and a Bit o’ Luck Help Avert Disasters

The "Wild West" days of disaster recovery planning were a simpler time for networks. The hardware was tough, businesses had greater tolerances to outages and IT managers rode the range confident the homestead was safe. Today, businesses rely on the uninterrupted performance of its IT structure. More than trust in the resilience of hardware is required to safeguard an organization's information assets.