Enterprise


5 Costliest Deduplication Problems -- And How To Avoid Them

How do you pick the best deduplication strategy? We explain how to avoid the five costliest problems you can make when choosing deduplication technology for big data environments.

Analysis: IBM's Latest Linux-on-Power Move

Given the success IBM has had with its RISC-Unix business, PowerLinux doesn't seem like a bad idea, but will its success come at the expense of AIX?

4 Side Benefits of Moving to the Cloud

Sure, the cloud can speed application delivery and help you minimize capital investments, but there are several indirect benefits you may not be aware of.

Open Source Application Development Breaks on Through

A majority of companies are standardizing on open source for their application development efforts, though they might not be effectively monitoring their use of open source.

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Q&A: Preventing Downtime

It's not enough to respond to downtime; what's needed is a new mindset that focuses on preventing downtime.

5 Strategies for Successfully Migrating Communications Services to the Cloud

The ideal cloud provider should be an enabler, not an inhibitor. These five strategies will help you choose wisely.



Q&A: Social-driven IT

Social media isn't just a marketing channel you bolt on to your current plans. You need to understand its true business-wide impact. How should your IT organization prepare to embrace social media over the next 12 months?

Analysis: Behind Dell's Shopping Spree

This month, Dell pulled the trigger on two significant acquisitions. What's behind Dell's acquisition moves, and why does at least one of them seem like a no-brainer?

Reducing the Risk from Data that Lives Forever

These three rules of thumb will help you avoid the risk of keeping corporate data forever (and ever).

4 Ways Virtualization is Changing the Ground Rules for Performance Management Software

Four reasons why virtualization, not cloud computing, is changing the ground rules used to design traditional performance management systems and why your enterprise needs to consider new virtualization-aware approaches to performance management.

Q&A: How The Mainframe Academy is Educating Tomorrow’s IT Pros

A certification program backed by CA Technologies may help supply IT’s next generation of trained professionals.

The Power of Platinum: A Look at 20 Years of ODBC

ODBC was a revolutionary technology 20 years ago. We look at its past and present, and suggest where it's headed.

Security Woes: Apple Hits the Big Time

Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.

Eye on Security: More Devices, More Data Points, Fewer Security Holes: Advanced Security Integration

Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.

Careers: Things Are Looking Up for IT Employment

Companies expect to hire more IT workers this quarter, but not as aggressively as they did in the first quarter of the year, despite their optimism about growth.

XBRL and Enterprise Standards

How standards are driving organization value and how they benefit IT.

Q&A: Managing Multiple Cloud Environments

First it was just "the cloud." Then came public clouds versus private clouds, and, of course, hybrid clouds. How is IT coping, and how do clouds fit in with other trends, such as the distributed data center?

New Studies, Products Demonstrate Cloud's Strong Growth

Cloud computing isn't just "with us" -- it's here to stay, and IT spending on cloud services is expected to explode.

Q&A: Setting Up a Second Line of Defense

Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.