IBM's Linear Tape File System (LTFS) is touted by enthusiasts as a "game changer" for the fortunes of tape technology in contemporary IT. ESJ's storage analyst, Jon Toigo, takes a closer look at the technology.
License compliance is tough, especially after a merger or acquisition. The secret to success of any license audit just may be normalization technology.
IT staff salaries are on the upswing, and bonuses have hit record levels for most positions in this year's survey.
Even though Big Blue’s revenues shrank, its earnings increased last quarter.
SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
From BYOD to social media, the trends that are keeping security administrators on their toes.
Make the most of your IT investments with these three tips to help you optimize your networks, applications, and clients.
Benefits, challenges, and best practices for incorporating a modular data center into your environment.
Management salaries rise; managers overseeing service-oriented architectures and business analytics shops command highest premiums.
If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.
Hardware migrations can be tricky. We discuss the keys to Kansas City Southern Railway's migration from mainframe to Linux.
Co-location facilities, mirrored data, hot-standby servers -- data center managers are doing all they can to avoid the debilitating effects of power outages. Or are they?
The cloud isn't right for every application. We explain the benefits of moving to the cloud, how to get "cloud ready," and what applications should remain within your data center.
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
The key to protecting enterprise assets is to start with the right objective. We explore five steps you can take to shift your focus and tackle a new backup/recovery reality.
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
Data centers growth has IT looking for alternatives. Is moving our processing and storage chores to the cloud a solution, or does it just shift the problem somewhere else?
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.