Case Studies/Best Practices


Three Considerations for Cloud Adoption in 2011

Why are IT departments turning to cloud computing rather than its alternatives and what makes the technology so compelling?

Using Social Technologies to Streamline Internal IT Operations

Social technologies are now an essential tool for bolstering internal IT services and communications. We explain how to get started with this powerful, new approach to IT collaboration and support.

Q&A: How IT Departments Can Optimize Business Processes

Business transaction management can optimize business processes and performance.

How to Secure Data in the Cloud and Beyond

Next-generation tokenization has the potential to help businesses protect sensitive data in the cloud in a more efficient and scalable manner than encryption and first-generation tokenization.

5 Best Practices for Web Application Performance and Accessibility

More data means heavier workloads for servers and networks. These five tips can help you stay ahead of performance issues.

Remotely Manage Hardware with Embedded Technology

Organizations must be cautious to ensure they can manage their embedded devices as their population grows.

DDoS Unbound

DDoS attacks are bigger and more frequent than ever, and a lack of insight into IPv6 security is particularly worrisome.



How Continuous Monitoring Can Help Financial Services Firms Avoid Cyber Attacks

Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.

Q&A: Managing Explosive Network Growth in Education

How one University tackled rapidly growing network traffic.

Ten Ways to Avoid Performance Black Holes in Data Center Build Outs

Emerging technologies in the data center place organizations at a unique crossroads.

Avoiding Common SOA Pitfalls

Knowing common SOA pitfalls is the first step to avoiding them. The authors of "100 SOA Questions Asked and Answered" point out how SOA governance teams and application teams can avoid these traps.

Q&A: Real-World Security Decisions

How do you secure an environment in which risky behavior is business as usual?

Q&A: Windows 7 Deployment

Challenges, mistakes, and best practices for moving to Windows 7.

Fixing the "Everyone" Problem in Windows Server

How to take control of default group access permissions settings for Windows Server.

7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Top 10 Questions Data Center Operators Must Answer in 2011

With the rising costs of energy and increasing pressure on organizations to be more "green," implementing a DCIM and/or DPO solution is inevitable.

Best Practices for Storage Management in 2011

These strategies will help you manage your growing storage needs in 2011.

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

3 Top Trends in Data Protection for 2011

As data centers struggle to meet their backup and recovery objectives, what will managers look for in 2011?