Features & News


No Catch to IBM Specialty Processors

IBM wouldn’t just give mainframe capacity away, would it? The short answer is: yes, it would—and it has.

Closing Security Holes with Application Scanners

Before unleashing sites and software, these products will spotlight code that can leave you vulnerable

Job Scheduling: The Three Generations

In the first of a three-part series, we outline the evolution of workload automation technology.

Industry Heavyweights Partner to Promote Secure Computing Infrastructure

Can the combined will of Microsoft, Cisco, and EMC overcome the ingrained inertia of government bureaucracy?

Storage Security Part VI: Locking Down the Disk

One company offers a way to secure data when different classes of data have different security requirements.

Windows Vista WAN Optimization: Panacea or Pretender?

A close-up look at improvements to file sharing in Windows Vista



Baby Steps: Teradata Verges Closer to Independence

Teradata users have been cautiously optimistic all along, and as things come down to the wire, user optimism seems to be growing.

Research: Tapping into Unstructured Data

Non-traditional data sources provide value and opportunity for increased performance

Outsourcing: Red Storm Rising

China is fast rising up the rungs of the global outsourcing ladder.

Storage Security Part V: Disk Encryption

Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest

How to Cut Mainframe Software Licensing Costs, Part II

IT can choose from a variety of techniques to reduce its mainframe software costs

SSL in the Enterprise: Challenges and Implications

Secure Sockets Layer encryption presents a tradeoff between keeping data private and allowing for network monitoring and the detection of intruders. The solution: transparent SSL proxies.

Cognos and Appfluent Partner to Improve BI Scalability

Scaling complex BI deployments isn’t getting any easier, Cognos and Appfluent say.

The Business Intelligence Power Rankings

The BI Top Five is essentially unchanged from last year. In fact, the top four BI players seem to have dug themselves in for the long haul.

SWOT: Microsoft Masters Data Management with its Acquisition of Stratature

Even the mighty Microsoft now plays in the MDM space.

How to Cut the (Not So) High Cost of Mainframe Software

If you do your homework, Big-Iron cost cutters argue, you can realize substantial mainframe software savings.

Podcast: SOA, Web Services, and Security

Securing SOA and Web services poses challenges for IT administrators. We look at several best practices and suggest how organizations should manage the transition to SOA and Web Services from a security perspective.

Four Solutions to Prevent Project Failure

While there is no magic formula to ensure a project’s success, our four recommendations can help you address the common project issues with a combination of people, processes, and tools.

Storage Security Part IV: Encrypt on the Target

The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.