Data protection budgets are in trouble because executives are getting the wrong pitch from storage pros.
De-duplication may seem like a way to go cheap on DR, but it can yield some expensive consequences.
Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.
Promises comes and go. A few have morphed into something different.
Some manufacturers are buying so much of the advertising in magazines that articles critical of certain products never see the light of day.
Networks are vital to your organization. We offer suggestions for moving from reactive to proactive network management.
Proponents say “going green” can help companies save money, but a secondary benefit may be just as important: delaying data center expansion.
Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.
Using a hosting provider and new ADC technology can help small and mid-size businesses compete with their larger rivals.
Green alone isn’'t going to sell archive. Recognition of fundamental data differences must make the case.
Looking into a SAN is murky business -- and usually unsuccessful.
The Big, Fast virtual systems of tomorrow might look a lot like today's Biggest, Fastest, and most eminently Virtual system: IBM's System z mainframe.
It's time to take another look at remote storage services.
It’s essential that IT understand the impact on network resources and application delivery of any and all anomalies in network behavior. Anomaly detection tools can help.
To minimize connectivity costs and ensure your investment addresses future business needs, consider an intelligent switch.
HP's POD is innovative and visionary, analysts say. In a world chock full of both innovation and vision, that's saying something.
We could be on the cusp of another revolution: a c-business paradigm shift, driven by cloud computing.
By now, IT and its line-of-business customers should have perfected the art of service level management. The opposite is the case, however.
These three steps can help you establish a "reality-based" risk mitigation plan
CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.