Instead of making big-bang investments, customers can reap the benefits of utility computing in more affordable ways.
Companies that consolidate their ERP stacks and implement consistent data definitions can reduce operating costs by nearly 25 percent
With improvement in storage virtualization products’ features and reliability will the technology choices get any easier?
Things change, no doubt about it. But honesty and integrity remain the mainstays of success.
Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail
Salary growth remains spotty for it staff
Organizations can derive the benefits of endpoint-security standards without the standards
Companies that reduce the complexity of their IT systems can generate significant savings
EMC's latest mega-storage product leaves our storage analyst baffled
Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.
As an IT knowledge worker, you must continually develop and employ new skills. Developing an explicit strategy that incorporates learning into your day-to-day job can bring big benefits.
Mainframe brain drain doesn't worry many old mainframe hands, who don’t see themselves going anywhere anytime soon
Last week, CA joined BMC and even IBM itself in announcing cuts to its mainframe workforce
Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.
It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.
HDS wants to take the market by storm
With its new generation of zSeries systems, IBM is shifting its focus beyond best-in-class performance and scalability
Partitioning and virtualization bring the mainframe's flexibility to distributed system and serve as the building blocks to utility-based (capacity-on-demand) solutions.
IT modernization projects help you deal with old application ghosts before they spook the bottom line. We offer seven best practices for controlling and managing a project
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.