Storage buyers have been conditioned to look for ever-greater "value." We explain why this behavior is so risky.
What technologies and best practices can make a data center greener?
Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.
What enterprises and IT must do to enhance their risk-management program.
Some industry analysts expect the economic downturn to result in a net gain for outsourcers.
Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Data protection budgets are in trouble because executives are getting the wrong pitch from storage pros.
How to avoid common mistakes enterprises make with their old e-mail messages.
SOA often sneaks into an environment as part of a packaged solution within SMBs.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
Non-traditional players -- such as Thailand, Egypt, and South Africa -- have emerged as offshore contenders.
Why current security tools aren’t adequate, and what vendors and IT must do now to secure their environment.
Four reasons you should consider an investment in IT process automation
To get the most from your Web 2.0 technologies, combine them with Enterprise 2.0.
Why is IT the last department to have automated tools?
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Employees who believe they may be fired may steal proprietary information to blackmail management
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.