Spam now accounts for close to 90 percent of all e-mail traffic.
With new processor, x86 systems are poised to make a serious run at RISC-Unix
Don't develop your backup plan based on what your DR software can do. Band-Aid fixes won't help -- we need to think about what and how you back up in a whole new way.
IBM beat competitors HP and Dell out of the gate, trumpeting a trio of new Nehalem-EX systems running on the fifth generation of its eXA architecture.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.
To help IT manage its file deluge, vendors are trying to develop a platform that delivers respectable performance for file access vendors. They're really just building a bigger junk drawer.
One way to keep problems from compromising your enterprise is to have a good monitoring system in place. We discuss the drivers and benefits of business transaction management, how it fits in your environment, and how your colleagues are using it.
Though mainframe sales may be down, commodity server sales are strong.
Given its widespread adoption, service-oriented architecture is clearly an integral component of cloud computing and software-as-a-service. However, without the management tools to address such issues as application performance, the rapid development and deployment of SOA-based services could fail.
We explain how to leverage data from switches and routers using flow monitoring.
Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.
PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.
The database industry is at a crossroads, but few agree on where things are headed.
A metadata-led approach to understanding applications can help architects regain control over the applications that run their business.
The recent POWER7 launch hints at what Big Iron aficionados can expect from System z11, particularly about performance and energy efficiency.
Is IT winning the battle against spam, or was a recent drop in malware and phishing volumes just a statistical blip in an otherwise upward trend?
Four reasons IT executives charged with business continuity planning, risk management, and disaster recovery must consider their employees and operations heavily in their plans.
A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.
IT organizations are budgeting to give employees a small pay increase in 2010 according to a recent report.
Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.