Features & News


ESJ Salary Survey 2012 Part 1: Management Salaries

Management salaries rise; managers overseeing service-oriented architectures and business analytics shops command highest premiums.

PCI Compliance in the Cloud

If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.

MED-V Not the Solution for Windows XP Migrations

MED-V won't help you avoid Windows XP's expiring life cycle support, Microsoft says.

Disaster Antidote: Getting Control of Data Center Power

Co-location facilities, mirrored data, hot-standby servers -- data center managers are doing all they can to avoid the debilitating effects of power outages. Or are they?

Q&A: Mainframe Migration Up Close

Hardware migrations can be tricky. We discuss the keys to Kansas City Southern Railway's migration from mainframe to Linux.

What Enterprises Should -- And Shouldn't -- Move to the Cloud

The cloud isn't right for every application. We explain the benefits of moving to the cloud, how to get "cloud ready," and what applications should remain within your data center.

Going Mobile: Introducing Your Mainframe to Modern Tools

With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.



Want a Better Backup Plan? Then Forget Backup

The key to protecting enterprise assets is to start with the right objective. We explore five steps you can take to shift your focus and tackle a new backup/recovery reality.

SQL Server 2008 R2 SP2 Released

Main issue addressed: format problems with SQL Server reporting services.

Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

Cloud Computing: Panacea or Power Monger?

Data centers growth has IT looking for alternatives. Is moving our processing and storage chores to the cloud a solution, or does it just shift the problem somewhere else?

How Remote Infrastructure Management Can Improve Processes and Increase Efficiency

These 6 action steps will help you get the most from outsourcing your remote infrastructure management.

Commentary: Survey of Agile in the Real World Confounds

A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.

Careers: It's a Cruel Summer for IT Job Seekers

U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.

Microsoft Offers Sneak Peek at Updated Office 365

Cloud-based application supports features of Office 2013.

Q&A: Akka 101

What makes Akka so valuable for building today’s distributed applications?

Improve New App Implementation Using Your Old Environment

By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.