Features & News


Traits of a Total Architect ... And All That Jazz (Part 2 of 4)

How a Total Architect is like a musician.

Is Friendlier Software Licensing and Pricing Ahead?

Forrester Research report details pricing, licensing trends for 2011.

How to Mitigate Smartphone Threats to Your Corporate Network

These tips can help you minimize mobile threats.

Tablets Having Big Impact on IT Budgets

This year, demand for tablet computers will actually help lift worldwide IT spending.

It Takes Two: Microsoft's DW Market Strategy Explained

Microsoft sees a bifurcated data warehousing market, with Fast Track SQL Server on the low end and SQL Server Parallel Data Warehouse at the top.

BI for the Masses, iPad Style

An overwhelming majority of organizations believe mobile BI will play an important -- perhaps even critical -- role in their information futures.

Q&A: Try a "Non-invasive" Approach to Data Governance

The path to data governance starts with small steps.



Five Key Trends Driving the Future of BI

What’s ahead for BI? We offer five trends happening now that are irreversible and have substantial implications for BI.

The Holy Grail of Storage Efficiency (Part 1 in a Series)

Why is storage efficiency so abysmal?

CA Courts SecurID Customers

Who said hardware authentication tokens are infallible? CA's new program contrasts the advantages of its software-based approach with RSA Security's hardware-based SecurID model.

Using Distributed Computing to Reduce Downtime, Accelerate IT Recovery

Architecture changes and technologies are emerging that enable IT professionals to provide solid infrastructures, eliminate downtime, and deliver applications with consistently high availability.

HP's HPC Server Refresh Hints at Exascale Future

Will Enterprise 2020 be hosting a substantial portion of its workloads on GPUs or on other non-traditional architectures?

How Total Architects Enable Project Success (Part 1 of 4)

Introducing the "Total Architect" and the benefits this position can bring to your enterprise.

10 Steps for Auditing Mobile Computing Security

How to audit the security of mobile devices.

Auditing Data Security in the Cloud

How to audit security when using a cloud provider.

Q&A: Best Practices for SLAs

Are SLAs still useful, and can metrics really measure what's important?

Hiring Plans Remain Steady Despite Positive Company Growth Expectations

Things look good but not great for IT job seekers, at least for the next few months.