How do you pick the best deduplication strategy? We explain how to avoid the five costliest problems you can make when choosing deduplication technology for big data environments.
Given the success IBM has had with its RISC-Unix business, PowerLinux doesn't seem like a bad idea, but will its success come at the expense of AIX?
Sure, the cloud can speed application delivery and help you minimize capital investments, but there are several indirect benefits you may not be aware of.
When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.
A majority of companies are standardizing on open source for their application development efforts, though they might not be effectively monitoring their use of open source.
It's not enough to respond to downtime; what's needed is a new mindset that focuses on preventing downtime.
The ideal cloud provider should be an enabler, not an inhibitor. These five strategies will help you choose wisely.
Social media isn't just a marketing channel you bolt on to your current plans. You need to understand its true business-wide impact. How should your IT organization prepare to embrace social media over the next 12 months?
This month, Dell pulled the trigger on two significant acquisitions. What's behind Dell's acquisition moves, and why does at least one of them seem like a no-brainer?
These three rules of thumb will help you avoid the risk of keeping corporate data forever (and ever).
A certification program backed by CA Technologies may help supply IT’s next generation of trained professionals.
Four reasons why virtualization, not cloud computing, is changing the ground rules used to design traditional performance management systems and why your enterprise needs to consider new virtualization-aware approaches to performance management.
ODBC was a revolutionary technology 20 years ago. We look at its past and present, and suggest where it's headed.
Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.
Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.
How standards are driving organization value and how they benefit IT.
Companies expect to hire more IT workers this quarter, but not as aggressively as they did in the first quarter of the year, despite their optimism about growth.
First it was just "the cloud." Then came public clouds versus private clouds, and, of course, hybrid clouds. How is IT coping, and how do clouds fit in with other trends, such as the distributed data center?
Cloud computing isn't just "with us" -- it's here to stay, and IT spending on cloud services is expected to explode.
Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.