Enterprise


Starting 2011: Hot Air and Hotter Storage

Are most of the announcements around hot storage innovations lately anything beyond hot air? Our storage analyst, Jon Toigo, finds one bright spot.

Networking Processor Requirements in Cloud Computing Environments

Service provisioning using cloud computing poses challenges for the data center. What’s needed is a multi-core, heterogeneous architecture.

Efficient Design Never Goes Out of Style

When it comes to development, smaller truly is faster.

7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

Top 5 Application Performance Challenges

Tips to identify and prevent the top headaches Java developers face.

Careers: As the World Outsources

India faces pressure from both Eastern European outsourcing destinations and a new crop of scrappy Asia-Pacific upstarts.

Survey: Capturing Requirements is Top Agile "Pain Point"

Going Agile shifts the focus of gathering application requirements from detailed specifications to user stories, and that's the biggest obstacle to success, according to a recent survey of companies making the leap.



Top 10 Questions Data Center Operators Must Answer in 2011

With the rising costs of energy and increasing pressure on organizations to be more "green," implementing a DCIM and/or DPO solution is inevitable.

Making Sense of Contract Management

Contract lifecycle management solutions can provide greater insight and control over contractual obligations; helping companies to manage risks and increase profits.

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Big Iron in a Class by Itself

What’s the most reliable server operating platform of them all? If you answered z/OS, you’re right. The rest of the tally might surprise you, however.

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Virtualization 2011: Collaboration with Network Infrastructure

Enterprises are striving to increase server virtualization this year. The maturity of server virtualization will help drive the planning of your network strategy; another is desktop virtualization.

Spam Takes a Holiday

Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?

Best Practices for Storage Management in 2011

These strategies will help you manage your growing storage needs in 2011.

2011: The Year of SaaS for IT Management

This is the year when enterprises will evaluate SaaS solutions for cloud-based IT management.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

Calculating the True Costs of Cloud Computing

Understanding what you are paying for helps you uncover hidden costs and measure ROI.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.

6 IT Predictions for 2011 -- And a Resolution for Change

From automation to the cloud, IT leadership to self-awareness, these trends may dominate IT this year. Are you prepared?