Features & News


Security in the University, Part 2 of 2

Ohio State University’s CISO Charles Morrow-Jones looks at the cost of guarding against breaches, plus a best practice for all IT shops.

Consolidation, Security Products Announced at System z Summit

Big Blue announces new consolidation and security products as part of its $100 million mainframe simplification and modernization effort

TDWI Radio News: Spotlight on Spotfire

Data visualization seems to be getting hotter, as evidenced by TIBCO’s acquisition of data viz specialist Spotfire.

PerformancePoint a Tougher Sell than Anticipated?

Don’t look now, but Office and Excel are shaping up as PerformancePoint Server’s biggest competition.

BI’s Gang of Three

What do Microsoft, Oracle, and SAP have going for them, and where do they need to improve if they’re to tackle the best-of-breeds?

IBM Revamps Virtualization Tools

The updated Systems Director could be a hot ticket for many System p and System i customers.

Security in the University, Part 1 of 2

Ohio State University’s CISO Charles Morrow-Jones explains how the distributive, collaborative environment of a university affects security.



Storage Security in a Box? (Part III in a Series)

Placing storage security in the network is another option for locking down your data

Maintaining Up-time in an Ever-Changing Environment

A new survey sheds light on the high cost of downtime, and reveals how IT departments are struggling to manage complex environments

Securing Business File Transfers

Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.

If Green IT Sells, Who’s Buying?

A consortium of computing heavyweights gathered together last week to help keep the Green IT bandwagon going

SAP and the Strategy Management Game

So much for SAP not being willing to spend, at least at a pace with rival Oracle Corp., to acquire talent and technology.

The SAP Partnering Strategy: Keep Disparate Friends Close

Keep your friends close and your partners closer, as it were.

Data Breach Kit: Five Steps to Help You Survive the Inevitable

Fact: Information systems are porous. Most companies will, despite their best efforts, allow some level of data exposure during the next year. Are you ready? Learn the tools and processes you need in place now to control data-breach damage, perform digital forensics, and gather the evidence required to recover and reduce risk.

IBM, Sun Prove Why Grid Computing is Alive and Well

Successful grid services from both IBM and Sun Microsystems offer proof that grid computing is alive and well in the enterprise

True Identity Management: Watch the Gamblers

To learn about good IT security management practices for your enterprise, take a lesson from a casino.

IT Security: Lessons of a Thirty-Year Career

IT security has changed in the last 30 years; we look back and explore what IT must do now to get a better grip on the environment.

Podcast: Managing Data Center Complexity

What are IT departments doing to address the growing complexity of their data centers? We examine the results of a recent survey and explore the trends.

Big Iron Big in Brazil

Brazil invests nearly one-third of its total IT spending in mainframe systems

Data Visualization Goes Mainstream?

BI-er beware: having a dashboard isn’t the same thing as having data visualization technology, much less a data visualization strategy.