Enterprise


Auditors, Employers at Odds Over Security

A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.

Five Steps to a Continuously Compliant Data Center (Part 2 of 2)

These five steps provide a road map for continuous compliance in the data center.

Last Call for IPv4

It's time to start planning your transition to IPv6.

Orchestrated ALM: The Secret to Developing "Killer Apps"

Speed and efficiency in app development and delivery are critical to building a winning enterprise.

Integrating Physical and Logical Access Control

Two security approaches, working in tandem, provide superior enterprise protection.

Blade Server Demand Driving High-Density Zones

High-density zones strike a balance between the power and cooling requirements of different kinds of data center assets. The rub, of course, is that they'll cost you.

Q&A: High-Availability Gets High Marks at School District

Load balancing helps provide high access on report-card day.



5 Steps to a Continuously Compliant Data Center (Part 1 of 2)

These five steps provide a road map for continuous compliance in the data center.

Slowly but Surely, IT Addresses Mobile Security Threats

Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices

Three Considerations for Cloud Adoption in 2011

Why are IT departments turning to cloud computing rather than its alternatives and what makes the technology so compelling?

Making Your Data Center Energy Efficient, One PUE at a Time

After all, if your company doesn't know what data center components waste energy, how can you change it?

CA Education, IBM Server News among SHARE Conference Highlights

IBM rides System z to server-market bragging rights and CA tees up $1 million in mainframe-related training.

App Development Survey Shows Most Projects Still Running Late

Application development delays of a few weeks are common. On the other hand, the vast majority of projects wrap up within three weeks of their target dates.

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

Five Tips for I/O Consolidation and FCoE in Your Data Center

The path to a successful FCoE deployment is not as daunting as you might think.

Using Social Technologies to Streamline Internal IT Operations

Social technologies are now an essential tool for bolstering internal IT services and communications. We explain how to get started with this powerful, new approach to IT collaboration and support.

Q&A: How IT Departments Can Optimize Business Processes

Business transaction management can optimize business processes and performance.

How to Secure Data in the Cloud and Beyond

Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.

Where is IBM's zBX?

IBM still hasn't made good on the most intriguing aspect of its zBX vision -- an extension to the x64 world.

Next-Gen Solutions for Your Mobile Workforce

This year could be a tipping point for enterprise mobile applications.