How data maps can help you manage your storage environment efficiently and effectively.
The public cloud is still the Wild, Wild West, but shunning the cloud until things become a bit more stable and predictable may not be the smart play.
How a team of five university students developed a cross-platform, mobile, real-time app for managing presentations with no mobile development training.
Social content is rich with information, but integrating it with other enterprise data can leave it isolated and unused. We explore how to wisely integrate the two.
EMC's DLm 8000 is its brawniest ever mainframe (virtual) tape library.
Getting just the right mix of security and user friendliness at Movado.
Changes in the security model or discontinued libraries may prevent existing applications from running on newer versions of Windows. We explain how your organization can overcome these compatibility challenges.
Exploiting the lower costs of energy during the night can help your data center cut its energy costs.
The movie "2001: A Space Odyssey" was released in 1968. Well over 40 years later, we still have a lot of work to do on the space flight front, but natural language processing is almost there.
Leverage these four patterns of success to make your cloud computing project a winner.
Strong demand for its ClearPath mainframe platform helped boost Unisys' profits in Q2.
Cloud readiness is more than market position and organization size. It is profoundly linked to your level of platform standardization.
The evolution of IT automation, how the technology has changed, where it is today, and where it's headed.
IBM's Linear Tape File System (LTFS) is touted by enthusiasts as a "game changer" for the fortunes of tape technology in contemporary IT. ESJ's storage analyst, Jon Toigo, takes a closer look at the technology.
License compliance is tough, especially after a merger or acquisition. The secret to success of any license audit just may be normalization technology.
Even though Big Blue’s revenues shrank, its earnings increased last quarter.
SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
From BYOD to social media, the trends that are keeping security administrators on their toes.
Make the most of your IT investments with these three tips to help you optimize your networks, applications, and clients.