Case Studies/Best Practices


Outsourcers Must Plan Their Chindia Strategy

Industry analysts at Gartner say forward-thinking companies must develop what they call a “Chindia” strategy

IBM’s Fundamental Impasse: At Least Both Sides Are Still Talking

Fundamental Software has run smack up against Big Blue’s refusal to sanction 64-bit mainframe emulation

Server Virtualization Success Eludes Many IT Organizations

There’s plenty of buzz about server virtualization, but success is not assured.

The Path to Large-Scale Virtualization Success

A closer look at the challenges of virtualization technologies in a large-scale initiative.

SOA: You’ll Need More than Technology

To transform a company’s architecture to an SOA model, a systematic long-term roadmap is critical.

Network Admission Control: Balancing Security and the User Experience

Two strategies and a dozen tips help you improve your user’s NAC

Careers: "Total Rewards" Packages Key to Employee Happiness, Motivation

IT organizations are hip to the fact that they’ve got to have the right people with the right skills at the right time to keep things humming along



Migration Readiness Assessments, Part 2: Reaping the Benefits

How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.

Step by Secure Step: Network Security Planning

With a little prioritization, setting up a network security plan doesn't have to eat up all your time.

Case Study: Breaking the One-Stop-Shop Rule

Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.

Assessing Data Migration Readiness, Part 1: The Right Way to Begin

The power of a migration readiness assessment strategy framework is that it enables you to see what you are getting into with a data migration before you actually begin.

Harvesting Business Rules in a Process Context

Harvesting business rules from a legacy application has benefits ranging from simple documentation to application modernization. We provide a practical approach for collecting rules in a process context.

Simple Steps to IM Management

IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.

Case Study: Software Quality Controls Keep Game Site Purring

Online gaming company brings software development lifecycle under control

How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Improving Business/IT Efficiencies with Enterprise Architects

How an enterprise architect can help you maximize your investment in BPM and BRE tools and other technologies.

Case Study: z9 Rescues University from Processing Flood While Reducing Costs

The University of Toronto implements IBM’s new z9 Business Class system to increase and improve service levels while reducing costs

Real World Requirements for Unified Threat Management

Three key features IT should look for when shopping for a UTM solution.

ITIL to ILM, Part II

ITIL emerged from an effort to establish better coordination and service-level controls over IT infrastructure within the British government. It’s certainly changed since then.

Case Study: Rules Management Solution Powers Customer Incentive Program

Huge computer distributor sees immediate benefit from rules management