The benefits and best practices of using tape discovery.
What was Intel thinking? Was a vision of a hyper-connected future -- powered by hyper-secure embedded microprocessors -- a big factor?
Do Intel's new processors signal a seminal moment in storage innovation?
IT asset management (ITAM) is a tactical foundation corporate executives need to make sound strategic decisions. ITAM needs more than just an administrator to manage it.
Today's security market differs greatly from the market that was hammered almost a decade ago, following the dot.com implosion.
Smart storage isn't about applications running on an array controller; it's about manageability of the infrastructure.
Virtualization’s great promise may be compromised if virtual machines can't be easily recovered.
Four questions that promote security and regulatory compliance in your enterprise
What is cloud integration, and what dangers can you avoid by following best practices?
Choosing cloud-based vs. in-house storage solutions is like herding cats -- tricky.
Google seems to be the platform of choice for public cloud adopters; IBM gets high marks from private cloud users.
Big Blue's refresh includes the gargantuan POWER 795, which it pits against top-shelf systems from HP and Oracle.
Spam dominates e-mail; phishing attacks mimic support chat sessions.
Keeping your applications “always on” for users is no easy task. These best practices can help your enterprise maintain continuous automated availability in remote locations.
The co-creator of the MIME e-mail standard takes a look at the past and future of e-mail communication, how it's tied to social networking, and e-mail in the cloud.
Our storage analyst, Jon Toigo, explores a model that, if fully realized, would be light years ahead of what your favorite hardware vendors call "smart storage" today.
Java-COBOL integration tools provider Veryan has upgraded its flagship isCOBOL Application Platform Suite (isCOBOL APS).
Applications and environments are more complex than ever. DevOps may be the approach IT needs.
A new study underscores cloud computing's momentum and helps put the phenomenon into perspective.
Breaches could still be avoided, report notes.