Case Studies/Best Practices


Business Service Management Dos and Don'ts

An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.

Security's Future: Letting the Good Guys In

It may not be long before businesses differentiate themselves on the basis of security

Why Projects Fail (And How to Avoid the Pitfalls)

You can't do everything. Here's how to make your project a success.

Security: Batten Down the (IM) Hatches

IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks

Five Best Practices for Enhancing IT Development with Virtual Lab Automation

Software test and development labs play a key role in testing, validating, benchmarking, and evaluating new and emerging technologies.

Automation's the Name of the Game

Automation makes all the difference in a data center, which is why BMC, CA, HP, and IBM are spending heavily to get in on the action.

Why IT Must Act Now to Meet New PCI Data Security Standards

A bevy of vendors -- including most prominent services providers -- have announced new payment card industry-oriented services.



Virtualizing Disaster Recovery

Virtualization can be a boon to business continuity and disaster recovery planning -- provided you understand the risks

Windows XP SP3: T-Minus Four Weeks and Counting?

Industry watchers speculate that the third service pack for Windows XP -- complete with security-related features -- could appear soon

Grocery Chain’s Data Breach Extends Security Debate

Over 1,800 known cases of fraud result from data breach

Five Steps to Successful IT Process Automation

Follow these five simple steps to make sure you’re ready to implement IT process automation

Report Urges IT: It’s Time to Guard against the "Millennial" Threat

New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem

z10: Data Center in a Box?

For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense

Web 2.0 Pushes Need for Defensive Application Development

The Web 2.0 paradigm shift is fraught with both promise and danger

Keeping SOA Under Control

Runtime governance is the key to healthy SOA applications

Accelerating Agility through Workload Automation

By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.

The Virtualization of I/O (Part 2 of 2)

In the second part of our discussion, we take a closer look at two I/O solutions: InfiniBand and 10 GbE.

Mainframe Pros Sound Off about System z10

This year's Winter SHARE conference -- held last week in Orlando -- gave attendees a unique opportunity to take System z10 for a test drive.

Laptop Security: Hackers Attack Encrypted Data on Chips

Sleeping laptops may be the next way hackers steal encrypted information

Three Principles of Business Continuity

What does it take to successfully build a business continuity plan? It’s not the technology.