Features & News


Beware the Ides of March … and Storage Panaceas

None of the popular storage strategies—FC fabric, Big Iron, multi-tiered storage, or storage consolidation—has any intrinsic value, regardless of what a vendor may say.

Destroy, Shred, Disintegrate: Guidelines for Securely Decommissioning Storage

Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.

Enterprise Grid Computing: Usage Models (Part 4 of 7)

One benefit of the hierarchical framework for grids introduced last week is that it helps us discover (and provides insight into) key constituencies in a grid ecosystem and its dynamics. Understanding these dynamics is fundamental to building a sound grid strategy.

As the World Trains (Revisited)

Instead of embracing training as an investment in a savvy and innovative IT workforce, companies tend to view it as an encumbrance

Dashboard-Driven Analysis, ROLAP-Style

It’s an in-database, in-memory ROLAP engine that—officials say—could be just the Rx for dashboard-driven analysis.

DataFlux Puts a Data Quality-Centric Spin on Customer Data Integration

Data quality specialist sees CDI as an evolutionary extension of bread-and-butter data management.

SQL Server 2005 Taking the Fight to the Business Intelligence Pure Plays

Some SQL Server shops already expect to replace BI pure play tools with SQL Server’s native BI functionality.



Managing Storage, Part 2 of 2

Size is NOT everything … it's all in how you manage your data.

Enterprise Grids: A Framework (Part 3 of 7)

We explore what grids are, their usefulness, and how they should be implemented and deployed.

Business Process Success: Advice from an Expert

Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.

SNA and the Hot New Network Security Paradigm

No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm

The Push for Federated Identity Management

The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.

Get Better at Reinventing the Wheel

To succeed with knowledge management, organizations should focus on getting better at reinventing the wheel instead of avoiding it.

Do You Trust Your Storage to Mitigate Mobile-Device Threats?

Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications

Business Objects Goes Deep; Its Competitors Go Wide

Depending on how you look at it, Business Objects either threw down a gauntlet or manufactured a heck of a controversy. You decide which.

Best of Breed: Have Reports of Its Death Been Greatly Exaggerated?

If the all-in-one BI platform is the thing, why aren’t best-of-breed vendors quaking in their Aeron chairs? Do they know something you don’t?

Oracle’s Action-Packed Fortnight

It was a busy fortnight for Oracle, which completed its acquisition of Siebel, shipped new releases of Application Server 10g and JDeveloper 10g, and announced two new acquisitions, to boot.

Microsoft, Lotus Patch “Highly Critical” Problems

Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems

Splunk Touts Troubleshooting Rx

How you may be troubleshooting application performance and reliability issues in the loosely coupled application-scape of the future