How to avoid the worst problems in database design.
More data means more storage -- and more headaches. We look at today’s storage challenges, the impact of open source storage solutions and server virtualization, and the storage trends to watch this year.
SOA and cloud computing are hot topics in IT. Here's what you need to understand about how they're interconnected and how you can take advantage of their benefits.
Almost half of all IT organizations are understaffed; if or when IT spending comes back, shops may have to scramble to fill these vacancies.
Increasingly complex data center environments put an extra strain on your disaster recovery plans. How should you address performance, capacity, and management requirements and ensure your protection strategies are effective?
The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.
Oracle's post-Sun announcements harkened back to the heyday of single-stack computing: the IBM Corp. of the 1960s.
This approach can help you achieve data classification results dramatically faster than conventional methods.
With its acquisition of Sun Microsystems completed, Oracle Corp. on Wednesday laid out its plans for integrating Sun's software and hardware systems into its own product lineup.
Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.
In 2010, vendor marketing campaigns will ramp up with the usual hype.
A simple and affordable change you can make today can mitigate the risks of the DNS layer.
Asset management software can complement your current security tools to provide more complete desktop security.
A two-part approach can help IT comply with SLAs to satisfy end users.
Harried by legal, regulatory, or competitive concerns, organizations are increasingly paying much more attention to their desktop backup strategies.
IT and business must learn to speak a common language, manage according to business outcomes, and organize for value.
As the data experts, business users should regularly specify who has access to what data.
A new study from Aberdeen Research shows what works for getting the best performance from your Web applications.
IT organizations are highly exposed to security breaches through their information worker's mobile devices.
Mainframe and high-end server fortunes took a beating in 2009. An industry veteran says 2010 is shaping up to be an improvement.