Two strategies and a dozen tips help you improve your user’s NAC
zNextGen professionals say they’re drawn to Big Iron for the same reason as many older mainframes: staying power
Microsoft doesn’t put enough edge into its security products, yet.
IT organizations are hip to the fact that they’ve got to have the right people with the right skills at the right time to keep things humming along
More zNextGen grads were in attendance at last week’s SHARE get together than at any previous user conference, SHARE officials say
The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless
CA says organizations can offload some management tasks from their expensive mainframe general processors onto cheaper zIIPs
Only when the pain and cost of the status quo becomes too great to bear will users start to make some noise.
From smaller deals to an increased interest in China, the face of outsourcing is changing, a new survey reports
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.
Big Blue touts simplified mainframe admin features along with new versions of Tivoli, WebSphere, and DB2 software for z/OS
Are standards something we should really care about?
Hackers can take control of a Vista machine
z/VM 5.3 might still be five months away, but many VM programmers are already licking their lips in anticipation
Technology acquisition is a complex, often speculative task. Whether the means is build or buy, long-term value goes unmeasured and unrealized. The result is vaporware—or worse. What's the solution to spending savvy? A little-known framework for IT investment management could provide the answer.
In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.
From its chip strategy to its datacenter-in-a-box initiative, Sun has been reinvigorated
Some industry watchers think Big Blue’s midrange workhorse might have finally turned a corner
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.