Case Studies/Best Practices


Q&A: Virtualization -- From ROI to Optimization

From determining the ROI to ensuring you're getting the most from the technology, an infrastructure architect offers tips for IT professionals.

Five Keys to Successful Change Management Maturity

IT must implement an effective, mature method of change management or experience significant downtime and negative impact on productivity and profits.

Careers: IT Hiring Slowdown Ahead?

Caution in IT hiring plans

Solving Mainframe Entitlement Problems

Strong, effective IT security can be compromised by orphaned accounts and entitlements. We offer strategies to manage these expired accounts and entitlements.

Big Iron: The Cost-Cutting Platform

Mainframe shops continue to look to Big Iron for increased operational efficiency and lower costs.

Experts Advocate Multi-Purpose Approach to Fight Fraud

With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud

SQL Injection Attacks on the Rise

SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker



Green IT Goals, Actions Far Apart

Almost all IT shops say that boosting energy efficiency is a clear priority, but comparatively few are actually spending money to do it

Six Myths that Delay Endpoint Data Protection

Why saying "it can't happen to us" isn't a solution

Gartner Offers New View of Project Management

Used properly, project management offices can help CIOs make better decisions about how and where to spend their IT dollars

Seven Key Steps on the Road to PCI Compliance

Don’t overlook these seven steps you can take to complete your PCI compliance efforts.

IBM Makes Large Cloud-Computing Investment

Cloud computing isn't just a flash in the pan, advocates argue: it's game-changing.

Two Near-Disasters Highlight Backup/Recovery Deficiencies

During a regional disaster, a large company will quickly discover that the damage to small firms in the area can dramatically reduce its own recovery

DNS Flaw Ignites Controversy

A security researcher's speculation about a DNS flaw ignites another firestorm for full and responsible disclosure

Microsoft Adopts SaaS-y Licensing Models

Microsoft seems serious about SaaS. If so, SaaS -- often seen as a disruptive technology -- might ultimately become a major disruptive market force.

Old School Meets New Age: Modernizing Applications with Web 2.0

Web 2.0 technologies have barely scratched the surface of application development. Here’s what’s in store.

Service Level Agreements Too IT-centric, Forrester Report Warns

IT must improve communications with its business users and develop business-centric measures.

DNS Flaws Need Patching

Thanks to this month's DNS vulnerabilities, a lot of patching will be taking the time of DNS administrators. In fact, it might even seem like 2002 all over again.

Declaration of Independence, Storage Style

Given the nature of technology and of business economics, are we ready for a storage revolution?

HP Announces a Data-Center-in-a-Box Offering of Its Own

HP's POD is innovative and visionary, analysts say. In a world chock full of both innovation and vision, that's saying something.