Enterprise


Upgrade Your Business Along with Your Software

Software upgrades offer your enterprise an opportunity to enrich more than just application features.

Mobile Computing's Tipping Point

Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.

Data Centers Poised for Rapid Expansion, Environment Issues

If you think your data center power and cooling issues are bad now, just wait.

Q&A: Securing Storage in the Cloud

Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.

Distinctive Sybase Offerings Face an Uncertain Future

Thanks to SAP's acquisition of Sybase, the last of the best-of-breed data replication tools -- Sybase Replication Server -- faces an uncertain future.

Security Blindsided by Virtualization

When it comes to securing the increasingly virtualized systems of the 21st century, IT seems to be stuck in 20th-century mode.

Mainframe Brain Drain Revisited

Although efforts by mainframe boosters to recruit and train new technologists are bearing fruit, there are not yet enough newly-minted pros to offset concerns about brain drain in most shops.



Q&A: Business Continuity and Disaster Recovery

We examine the connection between business continuity and disaster recovery, explore what business impact analysis is and who's involved, and the tools available for this analysis.

Q&A: Why Compliance is the Best Friend and Worst Enemy of Good Security

Compliance efforts will also affect the security of your data. We explore the connection and what IT can do to protect its information assets.

Q&A: Managing Performance of Cloud-Based Applications and Services

Before you leap into the cloud, look at these challenges and best practices of managing performance of cloud-based services and applications.

Reports Confirm Virtualization's Growing Popularity

No one seems to know just how pervasive virtualization is, but everybody seems to agree that at some point -- perhaps very soon – it' will be ubiquitous.

Unifying Local and Remote Recovery

Three technologies that can help you create an integrated recovery plan.

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 2 of 2

We examine the remaining five challenges and how Active Directory provides a solution.

What Does "Archive" Really Mean? (Part 2 of 2)

More misconceptions clarified about the meaning of storage archiving, plus criteria you should use to make smart archive purchases.

Top 10 IAM Challenges for Heterogeneous Enterprises -- Part 1 of 2

As more users need multiple identities to access the applications they need regularly, IT has its hands full maintaining security.

Q&A: Working with Multiple Job Schedulers

Dealing with multiple job schedulers can be a challenge. We explore the problems, how IT goes about solving them (and how to avoid the typical mistakes), and the solutions available.

What Does "Archive" Really Mean? -- Part 1 of 2

One technology strategy sure to be strategic is data archiving. We clear up several misconceptions about the technology.

The Changing Face of Software Licensing

IT organizations don't yet have software vendors by the tail, but they do have new leverage, thanks to disruptive technologies such as SaaS and virtualization.

Client Virtualization: The Next Frontier

How to improve laptop management and the benefits of hosted virtual desktops.

Scale-out Infrastructures without Scale-Shattering Costs

Enterprise IT organizations are no longer forced to choose expensive, proprietary storage solutions to run their most important applications.