Features & News


Q&A: Balancing E-Mail Security and Compliance

How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?

Enterprise Grid Computing: The Value of Resource Pooling—A Transportation Analogy (Part 2 of 7)

A great way to understand the power and benefits of grids is to look at the philosophy and two key properties they share with large transportation systems.

Splunk Touts Troubleshooting Rx

How you may be troubleshooting application performance and reliability issues in the loosely coupled application-scape of the future

Imaging: Simple Data Protection in a Complex IT World

Adding an imaging solution to your data-protection strategy can protect you from any type of data or server calamity.

Managing Storage: What's Missing (Part 1 of 2)

Old-guard storage vendors believe storage management is the same as resource management. We explain why that concept is out of date.

Gartner Says Rip Roaring Business Intelligence Growth Just Ahead

BI software market should amount to $2.5 billion this year—and reach $3 billion by 2009.

Firstlogic Cashes In

From the moment it said “I do” to last year’s buyout proposal by Pitney Bowes, Firstlogic’s cards were on the table.



The Open Source Business Intelligence Tools Are Coming!

BIRT, Mondrian, and Pentaho headline the list of scrappy open source BI newcomers.

Sprint Nextel Reverses Course on Outsourcing

GM, Dell, and Gap all notched mega outsourcing deals, but Sprint Nextel backed out of its own outsourcing accord with IBM

Crawling the Internet to Find and Stop Spyware

Researchers find spyware lives especially on adult, game, and wallpaper sites. The enterprise security mandate is clear: start blocking those sites.

Enterprise Grid Computing: Why the Buzz? (Part 1 of a 7-part Series)

Interest in grid computing has grown quickly. In this first part of a seven-part series, we begin an in-depth look at the technology by examining its popularity.

IM Security: E-mail’s Poor Cousin

Despite the popularity of instant messaging (IM), many organizations don’t regard the communications channel as an enterprise security risk.

IBM BladeCenter Changes Chip and Chassis

What do the PlayStation 3 and IBM’s next-generation blade system have in common? A single Cell, you might say.

Storage Security is Nothing New

Only by looking at data targets, then building security in pragmatic layers around the targets, can you realize strategic data security

Can Business Intelligence Take 64-bit Computing Mainstream?

With 64-bit hardware increasingly pervasive and 64-bit operating systems priced to move, too, it’s only a matter of time, isn’t it?

What Is Business Intelligence? Vendors Voice Their Views

It shouldn't surprise anyone that software vendors overwhelmingly have self-serving takes on the state of BI today.

iWay Gets a Retrofit for SOA

Even an integration jack-of-all-trades can use a new service-enabled trick or two.

Maximizing the Benefits of Capacity Planning

IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.

Corporate E-Mail Security: Compliance Swamps IT Staff

IT managers look to better tools, including self-service retrieval for employees

A Dirty Little Secret: The Industry and iSCSI

Disinformation in the iSCSI vs. Fibre Channel debates is stronger than ever