Over 1,800 known cases of fraud result from data breach
New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
Ask a dozen executives about the state of storage resource management and you’ll get ten different answers, but one company -- Xiotech -- has shown the way to true management nirvana with its Web services-based management architecture.
Follow these five simple steps to make sure you’re ready to implement IT process automation
For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense
Will FCoE, which uses the same cabling as the next generation LAN, rapidly become the storage protocol of choice?
The Web 2.0 paradigm shift is fraught with both promise and danger
Now that mobile devices are so ubiquitous among enterprise workers, IT must face up the security challenges they pose.
Like the z9 EC and z9 BC systems that preceded it, IBM's System z10 drastically alters the rules of the mainframe game.
Runtime governance is the key to healthy SOA applications
Organizations will continue to place a premium on acquiring, and keeping top IT talent even during a recession
Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.
Increasingly, organizations are turning to IT outsourcing to enhance business outcomes instead of simply to control or reduce costs.
By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.
Mobile devices have moved beyond the domain of executives, but the rapid increase in use has been a drain on IT resources. Here’s how IT can fight back.
This winter's SHARE conference was a user confab to remember, attracting young and old IT pros alike.
Sleeping laptops may be the next way hackers steal encrypted information
In the second part of our discussion, we take a closer look at two I/O solutions: InfiniBand and 10 GbE.
Automating user access and compliance can free IT to work on more pressing problems
What does it take to successfully build a business continuity plan? It’s not the technology.