IBM wouldn’t just give mainframe capacity away, would it? The short answer is: yes, it would—and it has.
Before unleashing sites and software, these products will spotlight code that can leave you vulnerable
In the first of a three-part series, we outline the evolution of workload automation technology.
Can the combined will of Microsoft, Cisco, and EMC overcome the ingrained inertia of government bureaucracy?
One company offers a way to secure data when different classes of data have different security requirements.
A close-up look at improvements to file sharing in Windows Vista
Teradata users have been cautiously optimistic all along, and as things come down to the wire, user optimism seems to be growing.
Non-traditional data sources provide value and opportunity for increased performance
China is fast rising up the rungs of the global outsourcing ladder.
Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest
IT can choose from a variety of techniques to reduce its mainframe software costs
Secure Sockets Layer encryption presents a tradeoff between keeping data private and allowing for network monitoring and the detection of intruders. The solution: transparent SSL proxies.
Scaling complex BI deployments isn’t getting any easier, Cognos and Appfluent say.
The BI Top Five is essentially unchanged from last year. In fact, the top four BI players seem to have dug themselves in for the long haul.
Even the mighty Microsoft now plays in the MDM space.
If you do your homework, Big-Iron cost cutters argue, you can realize substantial mainframe software savings.
Securing SOA and Web services poses challenges for IT administrators. We look at several best practices and suggest how organizations should manage the transition to SOA and Web Services from a security perspective.
While there is no magic formula to ensure a project’s success, our four recommendations can help you address the common project issues with a combination of people, processes, and tools.
The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.