Some mainframe pros say that next-generation workloads (such as zLinux and J2EE) point the way to false destinies
Some IT jobs are more outsourcing-resistant than others
Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.
Will customers be able to establish real storage tiers and perform migrations of data per policy to enable 90 percent capacity allocation efficiency with a new arrival on the array horizon … and say goodbye to proprietary products?
With the acquisition last week of data quality specialist Similarity Systems, Informatica bucked the expectations of several industry watchers.
Many analysts expected Informatica to acquire long-time partner Firstlogic, but the conventional logic was wrong, as Similarity Systems found out.
New offering should be a boon to combined Cognos and Domino shops.
The FTC says federal anti-spam legislation is effective. Experts disagree.
Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.
As the first month of 2006 comes to a close, our curmudgeon of a storage analyst finds several companies deserve praise for their storage efforts.
Once deployed as a safeguard to maintain network availability, out-of-band technologies now take center stage as the integrated out-of-band infrastructure boosts productivity across the main network. We explore the benefits of these technologies.
Organizations may see service-enablement, and the next generation of SLAs, as a chance to improve the responsiveness and dynamism of their IT departments.
New processor could reduce the cost of exposing Big Iron DB2 to CRM, ERP, and other workloads
Come this time next year, dashboard kludginess could very well be in the rear-view mirror.
These days, the notion of business intelligence (BI) seems very much in flux—perhaps because everyone wants a piece of the pie.
Not such an about face for the ROLAP specialist.
Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.
Mirror, mirror on the….drive. Is continuous data protection the next holy grail? We look at three approaches.
In spite of their differences, mainframers seem to agree on a few important points, although even these may surprise you.
It’s worth remembering how much the employment outlook has improved in the last half decade—and how far we have still to go