Features & News


Integrating Canonical Message Models and Enterprise Data Models (Part 2 of 3)

How an enterprise data model is used to "facilitate messaging" and the benefits of using it that way.

Debunking 6 Myths about SSL VPN Security

Think VPN makes for secure data access and transfer? Think again.

Q&A: Can Developers and Admins Co-exist and Improve the Enterprise?

Can the gulf between development and operations be bridged?

The Elephant in the Clouds

Moving to the clouds doesn’t mean resources must be let go.

Over- or Under-size Your Backup Appliance on Purpose

When you're shopping for backup appliances, keep these four scalability parameters in mind.

Data Center Emergency Communications Key to Disaster Survival

The 4 Ps for staying informed when disaster strikes.

Dramatic Changes at Adobe Announced

Financial restructuring, Flash for mobile phase-out, job cuts ahead.



Windows on Mainframes Due December 16

Windows on the Big Blue's hardware is almost here.

Q&A: Monitoring the End-User Experience in VDI Environments

IT needs to supply the best customer experience while maintaining service-level agreements. We explain how VDI makes monitoring the end-user experience tougher and the best practices that will help you overcome these challenges.

E-mail Migration: Plans, Risks, Strategies Revealed in Report

Exchange 2010 is clearly the favorite solution for e-mail migrations, but the risks are clear. Even so, many enterprises aren't planning to conduct basic preventive measures such as data backup.

Why the Cloud Needs No Backup

With the cloud, it's backup without the actual backup.

Microsoft Reveals Licensing, Pricing for SQL Server 2012

Company describes its SQL Server 2012 licensing model.

Integrating Canonical Message Models and Enterprise Data Models (Part 1 of 3)

The enterprise data model (EDM) has failed. We explore a new way of using EDMs -- one in which an EDM can more directly affect the management of data than as merely a paper reference model.

Q&A: Governance Challenges of Unstructured Data

The growth of unstructured data presents special data governance challenges, but it can be managed as can other challenges around data governance.

QlikView Update Gets an Enterprise-Oriented Makeover

QlikView never pitched itself as an enterprise BI platform. With the new QlikView 11, it’s doing just that.

GIS Enriches Data, Enhances Decision Making

GIS information can enrich internal data, improve business processes or enhance decision making. So why aren’t you using it?

Social Media: A Hacker's Secret Weapon for Accessing Your Network

Deep content inspection-based security solutions let your organization take advantage of social media's benefits as it safeguards policies and compliance.

Trust in the Cloud is All About Transparency

Network-based application performance management may be just what service providers need to make the cloud ready for your mission-critical applications.

Cloud Computing in the Real World: 10 Steps to an Enterprise Cloud Strategy that Works the First Time

What can you do to ensure that your cloud computing plan is ready to go and will get the job done? These 10 steps will help.

Microsoft Report Dishes on Malware Prophylaxis, Zero Day Hysteria

Why do zero-day attacks -- which account for a vanishingly small percentage of all exploit activity -- generate a disproportionate percentage of security headlines.