Features & News


PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

Beyond the Firewall: Protecting Information Outside the Network

Information protection has transformed from protecting the network to protecting the information -- wherever it resides.

The Seven R’s of Change Management

Seven simple questions can help you assess change-related risk and gauge the effectiveness of your change-management process.

Hybrid Drives: Good Architecture or All Flash?

Is Microsoft's Vista responsible for a push to hybrid drives?

Teradata’s Split from NCR: Not Exactly Kramer vs. Kramer

Who will get what when Teradata splits from parent company NCR? Oddly enough, that doesn’t seem to be an issue.

PowerPlay: Cognos Gobbles up Celequest

Not all industry watchers see genius in the deal, but those who do say Celequest gives Cognos some serious dashboard muscle.

Step by Secure Step: Network Security Planning

With a little prioritization, setting up a network security plan doesn't have to eat up all your time.



System z: What IBM Still Needs to Do

IBM has done a lot to help revitalize the mainframe, Big Iron technologists say, but there’s still much work to be done

Case Study: Breaking the One-Stop-Shop Rule

Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.

Demystifying Enterprise Tiered Storage, Part 2 of 2

Last week we explained the four key factors in tiered storage. This week we explore how to align your storage strategy with business requirements.

Mainframe’s TCO Still Very Attractive, Analysts Report

Mainframe adoption should continue to take off in both existing and emerging markets.

Updated Security Information Manager Tackles Massive Event Logs

SIM adds real-time capabilities but compliance, not threats, stills drives this market

Assessing Data Migration Readiness, Part 1: The Right Way to Begin

The power of a migration readiness assessment strategy framework is that it enables you to see what you are getting into with a data migration before you actually begin.

ESI Come, ESI Go: Next Steps for E-Discovery

Since December, the US civil code has included electronically stored information (ESI) in its requirements for legal discovery. But surveys show most companies are unprepared to comply. What's the holdup, and how can companies move toward sustainable e-discovery management?

Teradata – A Division From NCR

Spin-offs usually result in two discrete companies, but will that be the case with the division of Teradata and NCR?

David Vs. Goliath: Big Blue’s Composite Challenge

Is EII stalwart Composite Software IBM’s biggest competitive threat?

Behind Teradata’s Split with NCR

NCR and Teradata officials left a good deal unresolved last week, especially the question of who gets what.

Why It’s Time for Network Access Control

Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.

Disaster Recovery Planning: Lessons From the Recent Past

In terms of disasters, it's been an eventful few years with hurricanes, floods, earthquakes, and winter storms. However, the silver lining of every dark cloud is a lesson that can help you prepare for the next incident. Experts share valuable advice to bolster your business continuity plans and face the inevitable force majeure that could cripple your company.

Careers: CIOs Planning Hiring Surge

CIOs expect to increase their IT staff levels at the fastest rate since 2001