Case Studies/Best Practices


Value-Add Software: The Risks for Storage Managers

Storage buyers have been conditioned to look for ever-greater "value." We explain why this behavior is so risky.

Q&A: Best Practices for a Greener Data Center

What technologies and best practices can make a data center greener?

Q&A: Protecting Growing Data Volumes

Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.

ID Theft Red Flags: The Challenge for IT

What enterprises and IT must do to enhance their risk-management program.

Outsourcing Uptick Ahead?

Some industry analysts expect the economic downturn to result in a net gain for outsourcers.

Get Ready for Compliance 2.0

Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.

A Trio of Technologies for Tackling Expansions in the Data Center

When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.



Why Data Protection Budgets are in Trouble

Data protection budgets are in trouble because executives are getting the wrong pitch from storage pros.

Correcting Your Worst E-mail Retention Practices

How to avoid common mistakes enterprises make with their old e-mail messages.

Q&A: SOA Challenges for SMBs

SOA often sneaks into an environment as part of a packaged solution within SMBs.

Microsoft Pulls the Plug on Windows Live OneCare

Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.

Outsourcing: Where the Jobs Are

Non-traditional players -- such as Thailand, Egypt, and South Africa -- have emerged as offshore contenders.

Q&A: Security Information and Event Management

Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.

IT Reality Check: Bracing for Impact in 2009

Four reasons you should consider an investment in IT process automation

Demystifying Enterprise 2.0: It's About Sharing, Not Technology

To get the most from your Web 2.0 technologies, combine them with Enterprise 2.0.

Q&A: IT Automation: Trends and Tips

Why is IT the last department to have automated tools?

The Year in Security and the Fresh Problems Ahead

All things considered, 2008 was a quiet but industrious year on the security front.

The Year in Review, The Trends Ahead

It was a pretty good year, for IT spending at least.

Survey Highlights Threats from Disgruntled Employees

Employees who believe they may be fired may steal proprietary information to blackmail management

Trusted Storage for Enterprise-class Hard Disk Drives, Part 2 of 2

Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.