When politics and storage collide, the results are too often unpredictable and unnerving.
A trojan targeting Monster.com shows that protection from the center to the edge -- and beyond -- is still needed.
Sun’s next-gen multicore design boasts a number of enhancements -- including dedicated FPUs for each core -- which make it a better overall processor.
There’s a growing consensus -- among IBM users, at least -- that Big Iron’s biggest selling point might well be its proven security model.
To stay in compliance, IT has had to focus on ensuring the right data is saved for the right length of time. A new court case may extend what data must be saved in the future. Regardless of the outcome of that case, we explore three steps IT must take to be prepared when lawsuits arise.
Expect them when you least expect them: surprises at a TDWI World Conference.
Data modeling, that once sleepy demesne of data warehouse architects and hot-shot business intelligence (BI) analysts, has become quite popular.
Can search deliver on the promise of ubiquitous BI? Maybe. As with any highly hyped technology, however, a few myths first need to be busted.
Do you know if your disaster recovery processes are up to date?
Troubleshooting network problems is easier thanks to retrospective network analysis, tools that let you go back in time to reconstruct failures.
The bad guys are targeting consumers, but enterprises still pay
Web 2.0 features give Notes 8 a collaborative edge; industry watchers applaud its platform underpinnings
Big Blue’s vision: a System z-centered security hub—along the lines of the mainframe-based Information hubs it’s been touting for a year now.
Visualize this: data visualization software is changing the game.
Whatever else it might be, the data warehouse appliance market is anything but sleepy.
Frank Buytendijk tells us what he really thinks.
IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.
In addition to recognizing Novell’s ownership of Unix and Unixware, the court’s ruling could also let IBM off the hook
Just as fast as spyware changes, IT must adapt in its fight against the intrusions. We explore best practices to help your enterprise avert spyware threats.