Enterprise


Bright, Shiny Things for Storage Managers

The tools for building a strategic storage infrastructure are available to intelligent consumers.

Q&A: Application Delivery Priorities Revealed in Survey

What do enterprises want most when it comes to application delivery?

5 Best Practices for Web Application Performance and Accessibility

More data means heavier workloads for servers and networks. These five tips can help you stay ahead of performance issues.

How Continuous Monitoring Can Help Financial Services Firms Avoid Cyber Attacks

Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.

Remotely Manage Hardware with Embedded Technology

Organizations must be cautious to ensure they can manage their embedded devices as their population grows.

Q&A: Managing Explosive Network Growth in Education

How one University tackled rapidly growing network traffic.

DDoS Unbound

DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.



Careers: IT Jobs -- A Safe Harbor of a Sort

With contract and services work all the rage, recruiting, retaining, or promoting full-time employees isn’t a high priority for most IT organizations at this time.

The Seven Deadly Sins of Managing an ERP Rollout

Visibility of entire system via automated structural analysis the key to being "sin-free."

Big-Iron Brouhaha: System z Sales Soar

System z is back! Sales surged by almost 70 percent during z Enterprise's first quarter of availability, while MIPS capacity increased by almost 60 percent.

Ten Ways to Avoid Performance Black Holes in Data Center Build Outs

Emerging technologies in the data center place organizations at a unique crossroads.

Extending Business Continuity beyond the Data Center with Application Availability

Application availability is critical in an always-on world in which businesses compete.

The Emerging Crimeware Market

The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.

Careers: A Job-Seeker’s Market?

Some jobs -- particularly in network administration, security, and software development -- are always in demand and hard to fill.

Q&A: Real-World Security Decisions

How do you secure an environment in which risky behavior is business as usual?

Web Data Centers: Big QoS and TCO Opportunities Require Innovation

Realizing the potential benefits for large-scale service deployments presents difficult challenges. We discuss these opportunities and challenges and recommend solutions.

Q&A: Windows 7 Deployment

Challenges, mistakes, and best practices for moving to Windows 7.

Fixing the "Everyone" Problem in Windows Server

How to take control of default group access permissions settings for Windows Server.

The Rise of Social Business Process Management

Having been successful in addressing the needs of structured work, the process community is turning its focus on managing the social components of work.

Data Center Efficiency: No Leader in x64 Server Market

IT shops don't perceive any single vendor as being more efficient than its competitors.