Both Microsoft and Oracle have now embraced Linux.  What does that mean for you?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SANs are out, virtual grids (aka storage clusters) are in.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    There’s gold in the SMB market, and IBM officials say they’ve made real gains in the lucrative space
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why a nearline component solution is the most practical and cost-effective way to keep data warehouse storage costs under control.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    More unstructured data and an emphasis on business intelligence will keep DBAs busy 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    DataFlux 8 features new project acceleration and geocoding enhancements, along with bread-and-butter data profiling improvements
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    BI systems can work magic for decision-support, but only if someone on the business side sponsors them!
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s been a busy fortnight for Business Objects, which previewed its next-gen BI suite and touted its new sales and marketing alliance with IBM.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    An increasing number of organizations are tapping full-fledged PM tools—including performance scorecards and dashboards.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Merging IT and physical security can bring some exciting synergies to an enterprise.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    After a quarter like System z just had, it’s difficult to see how or why competitors are still writing epitaphs for Big Iron
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s all-but-official: electrical power consumption is a big issue today and will be an even bigger issue tomorrow.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Increasingly, hackers have infiltrated "protected" enterprise networks.  One NAC provider says the key to maximizing your protection is to know what’s on your network.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Feedback on our column about clustering inefficiency.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Kalido is that rarest of extant creatures: a best-of-breed DW vendor. With a wrinkle or two, of course.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    For some organizations, surprisingly, SQL Server 2005 has been a more or less turnkey migration experience—especially on the BI front.