Features & News


Why Politics and Storage Don’t Mix

When politics and storage collide, the results are too often unpredictable and unnerving.

A Monster Lesson: Security Must Be Everywhere

A trojan targeting Monster.com shows that protection from the center to the edge -- and beyond -- is still needed.

Analysis: Lifting the Hood on Sun’s New UltraSPARC T2 Chip

Sun’s next-gen multicore design boasts a number of enhancements -- including dedicated FPUs for each core -- which make it a better overall processor.

Mainframe Proponents Talk Up Platform’s Security Strengths

There’s a growing consensus -- among IBM users, at least -- that Big Iron’s biggest selling point might well be its proven security model.

Avoiding the RAMifications of Storage Retention

To stay in compliance, IT has had to focus on ensuring the right data is saved for the right length of time. A new court case may extend what data must be saved in the future. Regardless of the outcome of that case, we explore three steps IT must take to be prepared when lawsuits arise.

Some Surprises, a Couple Shrugs at TDWI World Conference

Expect them when you least expect them: surprises at a TDWI World Conference.



In Praise of Data Modeling

Data modeling, that once sleepy demesne of data warehouse architects and hot-shot business intelligence (BI) analysts, has become quite popular.

On the Advantages and Disadvantages of BI Search

Can search deliver on the promise of ubiquitous BI? Maybe. As with any highly hyped technology, however, a few myths first need to be busted.

Pushbutton Disaster Recovery

Do you know if your disaster recovery processes are up to date?

Reverse Network Analysis: Simple Solutions for Complex Networks

Troubleshooting network problems is easier thanks to retrospective network analysis, tools that let you go back in time to reconstruct failures.

Why IT Security Must Combat Organized Cybercrime

The bad guys are targeting consumers, but enterprises still pay

Big Blue Unveils Next-Gen Notes

Web 2.0 features give Notes 8 a collaborative edge; industry watchers applaud its platform underpinnings

How IBM’s Updated z/OS Improves Security

Big Blue’s vision: a System z-centered security hub—along the lines of the mainframe-based Information hubs it’s been touting for a year now.

TDWI Radio News: Visual i|o Opens New Doors

Visualize this: data visualization software is changing the game.

DATAllegro Ups Ante in DW Appliance Segment

Whatever else it might be, the data warehouse appliance market is anything but sleepy.

BI Guru Declares: Service Level Agreements Stink

Frank Buytendijk tells us what he really thinks.

IPLocks Tackles Database Security

IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.

Analysis: The Beginning of the End for SCO?

In addition to recognizing Novell’s ownership of Unix and Unixware, the court’s ruling could also let IBM off the hook

Podcast: Best Practices for Tackling Spyware

Just as fast as spyware changes, IT must adapt in its fight against the intrusions. We explore best practices to help your enterprise avert spyware threats.