Mainframe pros sound off about the year ahead
In less than 18 months, perpendicular recording has gone mainstream. It is one of those little-noted technology innovations, but one that is extraordinarily important.
Composite applications -- containing logic and data from multiple IT sources coupled with Web services standards -- bring higher end-user satisfaction without requiring full SOA implementation, a new research report reveals.
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
Views of tiered storage differ wildly because there is no clear, concise, universally accepted definition of the technology. We offer a definition that spells out the four attributes of tiered storage.
Warehouse Miner 5 looks like Teradata’s most ambitious release to date.
If Gartner says HP has finally arrived as a BI power player, then HP must finally have arrived as a BI power player, right?
After a marriage of more than 15 years, NCR and Teradata to part ways.
Both Compuware and IBM notched a pair of mainframe-related acquisitions
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
Harvesting business rules from a legacy application has benefits ranging from simple documentation to application modernization. We provide a practical approach for collecting rules in a process context.
The release of CERT information raises a controversy between storage security vendors.
The application server marketplace isn’t the exclusive playground of J2EE and .NET: CICS is amply represented, market watcher IDC says
Industry watchers once scribbled epitaphs for pure-play competitor Informatica. A funny thing happened, however: Informatica has thrived.
Wouldn’t it be great if there were an open, extensible business reporting language? The good news is that such a standard already exists. Sort of.
What’s the big to-do about an XML-optimized EII platform? Plenty, says Ipedo
With the data inside the data center secured, IT must now address the problems of a growing mobile work force. We discuss how enterprise data protection has changed and where it’s headed.
While many of these data centers may not perceive they are in the world of SOA, they have more than arrived. These are fully distributed applications that are growing in functionality and sophistication, becoming central to the business and in many cases achieving the rank of "mission-critical."
Do Big Blue’s mainframe TCO assertions add up?
IBM is pushing a retro database security model: bring it all back home to the mainframe, and trust the security and privacy of Big Iron