Enterprise


Seven Deadly Sins of Database Design

How to avoid the worst problems in database design.

Q&A: Enterprise Storage Challenges

More data means more storage -- and more headaches. We look at today’s storage challenges, the impact of open source storage solutions and server virtualization, and the storage trends to watch this year.

Q&A: Cloud Computing and SOA Convergence

SOA and cloud computing are hot topics in IT. Here's what you need to understand about how they're interconnected and how you can take advantage of their benefits.

Careers: IT Still Seriously Understaffed

Almost half of all IT organizations are understaffed; if or when IT spending comes back, shops may have to scramble to fill these vacancies.

Q&A: Disaster Recovery Considerations for Large Enterprises

Increasingly complex data center environments put an extra strain on your disaster recovery plans. How should you address performance, capacity, and management requirements and ensure your protection strategies are effective?

Enterprise Applications in the Cloud: A SaaS Security Perspective

The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.

With Sun Deal Behind It, Oracle Goes Retro

Oracle's post-Sun announcements harkened back to the heyday of single-stack computing: the IBM Corp. of the 1960s.



Five Ways to Streamline Your Data Classification Project

This approach can help you achieve data classification results dramatically faster than conventional methods.

Oracle Outlines Sun Integration Plan

With its acquisition of Sun Microsystems completed, Oracle Corp. on Wednesday laid out its plans for integrating Sun's software and hardware systems into its own product lineup.

Q&A: Assessing Cybersecurity's Past, Planning for the Future

Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.

On to a New Decade

In 2010, vendor marketing campaigns will ramp up with the usual hype.

Enterprises on Thin Ice with DNS

A simple and affordable change you can make today can mitigate the risks of the DNS layer.

Why IT Asset Management is Critical to Your Network Security

Asset management software can complement your current security tools to provide more complete desktop security.

Best Practices for Mission-Critical Hardware Support

A two-part approach can help IT comply with SLAs to satisfy end users.

IT Shops Shifting Focus to Desktop Backup and Recovery

Harried by legal, regulatory, or competitive concerns, organizations are increasingly paying much more attention to their desktop backup strategies.

Service Portfolio Management and the Business Value of IT

IT and business must learn to speak a common language, manage according to business outcomes, and organize for value.

Q&A: How Attestation Enhances Security and Eases Compliance

As the data experts, business users should regularly specify who has access to what data.

New Study Reveals Best Practices for Top Web Application Performance

A new study from Aberdeen Research shows what works for getting the best performance from your Web applications.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Watching Big Iron: A Rosier Outlook for 2010

Mainframe and high-end server fortunes took a beating in 2009. An industry veteran says 2010 is shaping up to be an improvement.