Corporate chiefs still earn significantly more than IT staff—although the gap <em>has</em> narrowed
You can’t optimize capacity utilization until you understand the data you’re storing.
What IBM should do to prevent their BI market dominance
Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.
As companies become ever-more reliant on IT, system availability becomes essential. Application performance management tools can help.
Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.
A recent about-face from market watcher IDC on the IT spending front highlights the still-fragile state of the IT recovery
The first generation of continuous data protection relied on tape; in today’s networked world, that could be dangerous.
Data storage has moved beyond managing transactions in a database. We explore the changing nature of data, conventional and clustered storage, and the business value of a new class of storage technologies.
IT pros are surprisingly nuanced in their objections to, or support of, offshore outsourcing.
Your responses to our Reader Survey will help us make ESJ a more valuable resource in your IT toolkit.
Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.
Speaking a language spyware purveyors understand: fines and jail time
Readers are on the right wavelength when it comes to their storage concerns.
The largest conference devoted to storage networking wrapped up last week. We learn what’s new and what caught our storage analyst’s eye—plus news of a new disaster recovery summit.
How secure are those online applications?
While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.
In spite of an economic recovery, it isn’t quite business as usual—or business-circa-1999—for beleaguered North American IT pros
Active-Circle says it provides a centralized mechanism for establishing policy-based management across your existing network-attached infrastructure. We take a closer look.
The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.