Enterprise


IT Losing the War Against Spam

Spam now accounts for close to 90 percent of all e-mail traffic.

Intel's Nehalem-EX to Inaugurate a New Era in x86 Scalability

With new processor, x86 systems are poised to make a serious run at RISC-Unix

The Need for New Thinking about Backup/Recovery

Don't develop your backup plan based on what your DR software can do. Band-Aid fixes won't help -- we need to think about what and how you back up in a whole new way.

Big Blue Makes Its Bid for Next-Gen Nehalem Bragging Rights

IBM beat competitors HP and Dell out of the gate, trumpeting a trio of new Nehalem-EX systems running on the fifth generation of its eXA architecture.

The Security Risks of Enterprise Search

We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.

Files, Files Everywhere

To help IT manage its file deluge, vendors are trying to develop a platform that delivers respectable performance for file access vendors. They're really just building a bigger junk drawer.

Q&A: Business Transaction Monitoring and Proactive IT Management

One way to keep problems from compromising your enterprise is to have a good monitoring system in place. We discuss the drivers and benefits of business transaction management, how it fits in your environment, and how your colleagues are using it.



Commodity Iron on Top

Though mainframe sales may be down, commodity server sales are strong.

The Key to SOA Success: Application Performance Management

Given its widespread adoption, service-oriented architecture is clearly an integral component of cloud computing and software-as-a-service. However, without the management tools to address such issues as application performance, the rapid development and deployment of SOA-based services could fail.

Q&A: What You Can Learn by Monitoring Network Flows

We explain how to leverage data from switches and routers using flow monitoring.

E-mail Attachments: Misperceptions That Can Compromise Security

Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.

PDF Payloads Increasingly Pack Malicious Punch

PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.

Data Management at a Crossroads

The database industry is at a crossroads, but few agree on where things are headed.

Architecting for Reality

A metadata-led approach to understanding applications can help architects regain control over the applications that run their business.

POWER7 Makes a Splash

The recent POWER7 launch hints at what Big Iron aficionados can expect from System z11, particularly about performance and energy efficiency.

MessageLabs Reports (Slightly) Good News for Security Administrators

Is IT winning the battle against spam, or was a recent drop in malware and phishing volumes just a statistical blip in an otherwise upward trend?

The Employee Factor of Continuity Planning: Four Reasons It Matters to IT Executives

Four reasons IT executives charged with business continuity planning, risk management, and disaster recovery must consider their employees and operations heavily in their plans.

A Desktop Operating System Security Report Card

A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.

Report: IT Workers May See Pay Bump in 2010

IT organizations are budgeting to give employees a small pay increase in 2010 according to a recent report.

Guarding the Information Treasure Chest: Databases and Data Breaches

Protecting the network is no longer enough. IT needs a watchdog to protect databases from external breaches and internal sabotage.