Enterprise


Utility Computing: Implementation Approaches

Instead of making big-bang investments, customers can reap the benefits of utility computing in more affordable ways.

Why ERP Does Matter

Companies that consolidate their ERP stacks and implement consistent data definitions can reduce operating costs by nearly 25 percent

Next-Generation Storage: Think Virtual

With improvement in storage virtualization products’ features and reliability will the technology choices get any easier?

Sun’s Secret Weapons at STK

Things change, no doubt about it. But honesty and integrity remain the mainstays of success.

Microsoft Can’t Count: New Vulnerability Disclosure Criticism

Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail

2005 Salary Survey, Part 1: IT Staff Positions

Salary growth remains spotty for it staff

Q&A: The State of Endpoint Security

Organizations can derive the benefits of endpoint-security standards without the standards



An Rx for Cost Savings: Keep IT Simple, Study Shows

Companies that reduce the complexity of their IT systems can generate significant savings

Bigger Can Be Baffling

EMC's latest mega-storage product leaves our storage analyst baffled

Giving Users Control of E-mail Archiving for Compliance

Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.

Four Keys to More Effective On-The-Job Learning

As an IT knowledge worker, you must continually develop and employ new skills. Developing an explicit strategy that incorporates learning into your day-to-day job can bring big benefits.

Careers: Big Iron Pros Sticking Around

Mainframe brain drain doesn't worry many old mainframe hands, who don’t see themselves going anywhere anytime soon

Mainframe Sales Slump Trigger Workforce Cuts

Last week, CA joined BMC and even IBM itself in announcing cuts to its mainframe workforce

Zero Day Initiative Trades "Points" for Vulnerabilities

Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.

Securing Admin Passwords: It Takes a Vault

It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.

Son of Tagmastore Targets Sweet Spot in Entry-Level Storage

HDS wants to take the market by storm

With z9, IBM Touts More Than Performance and Scalability

With its new generation of zSeries systems, IBM is shifting its focus beyond best-in-class performance and scalability

Mainframe Legends Guide Virtualization, Partitioning in an "On Demand" World

Partitioning and virtualization bring the mainframe's flexibility to distributed system and serve as the building blocks to utility-based (capacity-on-demand) solutions.

You've Been Left a Legacy—Now What? (Part 2 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We offer seven best practices for controlling and managing a project

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.