An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.
It may not be long before businesses differentiate themselves on the basis of security
You can't do everything. Here's how to make your project a success.
IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks
Software test and development labs play a key role in testing, validating, benchmarking, and evaluating new and emerging technologies.
Automation makes all the difference in a data center, which is why BMC, CA, HP, and IBM are spending heavily to get in on the action.
A bevy of vendors -- including most prominent services providers -- have announced new payment card industry-oriented services.
Virtualization can be a boon to business continuity and disaster recovery planning -- provided you understand the risks
Industry watchers speculate that the third service pack for Windows XP -- complete with security-related features -- could appear soon
Over 1,800 known cases of fraud result from data breach
Follow these five simple steps to make sure you’re ready to implement IT process automation
New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense
The Web 2.0 paradigm shift is fraught with both promise and danger
Runtime governance is the key to healthy SOA applications
By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.
In the second part of our discussion, we take a closer look at two I/O solutions: InfiniBand and 10 GbE.
This year's Winter SHARE conference -- held last week in Orlando -- gave attendees a unique opportunity to take System z10 for a test drive.
Sleeping laptops may be the next way hackers steal encrypted information
What does it take to successfully build a business continuity plan? It’s not the technology.