Case Studies/Best Practices


Q&A: The True Cost of the Cloud

With budgets under scrutiny, cloud computing may offer a strong ROI -- but only if you calculate costs properly.

3 Tips for Predicting Your Way to a More Efficient Data Center

The full benefits of virtualization technologies can only be realized by integrating predictive analytics into IT operations so managers can gain greater control over capacity, efficiency, and risk.

Top Storage Trends for 2013

Storage is still about finding the right balance of performance, capacity, and usage

5 Sysadmin Holiday Survival Tips

You can survive support tasks with some careful planning. These tips can help.

Making the Grade: 6 Data Protection Best Practices for Universities and Colleges

We explore the best practices that address the special needs of educational institutions.

Q&A: Taking a Risk-Based Approach to Security

Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.

5 Considerations for Your Move to the Cloud

Pay close attention to these five technology elements before moving to the cloud.



Best Practices in System Copy: Automate in the Cloud

Cut the cost and improve the accuracy of SAP system copy chores.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

Q&A: Application Performance Management in Action (Case Study)

When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.

Best Practices for Creating an Effective Business Continuity Plan

Your business continuity plan must focus on three elements: people, infrastructure, and processes.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

The New Meaning of Software Quality

Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.

5 Tips for Switching Vendors

Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.

Q&A: Managing Cloud Downtime

The cloud offers enterprises several economic advantages, but downtime can seriously affect your bottom line. We examine how to prepare for -- and work around -- such service interruptions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.

Q&A: Using Process Automation to Improve the Digital User Experience

IT process automation can be a key advantage for IT teams looking to improve the digital customer experience. Teams are tapping the power of this technology to make workflows faster, better, and more reliable.