Enterprise


BMC Announces "Significant" Overhaul of Job Scheduler

In the new version of CONTROL-M, BMC is trumpeting a job rollback and auditing feature, along with virtualization-friendly amenities

Q&A: Securing Mobile Devices

How to handle the special security risks posed by portable devices

Enterprise Systems 2008 Salary Survey, Part 1: Staff Positions

In the first part of our four-part report, we look at compensation growth for professional positions

Q&A: VM Evolution and Systems Management

System complexity is burdening systems managers. We look at the landscape.

Disgruntled Employees Pose Large Inside Threat

A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.

With InfoSphere, Big Blue Touts Mainframe-Ready Integration Features

IBM's InfoSphere data integration platform is brimming with mainframe goodies



RAID and the Road to Greener Storage

Ratcheting back on disk power costs via RAID controller management software is one approach to "going green."

Vulnerability Management: Assess, Prioritize, Remediate, Repeat

Results of AberdeenGroup research shed light on best practices in vulnerability management

Server Sales Immune to Economic Sluggishness

Sales of its System z mainframes helped propel IBM to the top of the server market. Unix server sales were also up.

Selecting Your Data Replication Solution: Top 3 Criteria

Data replication plays an important part in risk management strategies.

Best Practices in IT Governance

Five steps in a unique process that visionary CIOs can use to meet their company’s strategic goals

Virtual Systems of Tomorrow Could Take Cues from Today's Mainframes

The Big, Fast virtual systems of tomorrow might look a lot like today's Biggest, Fastest, and most eminently Virtual system: IBM's System z mainframe.

Mitigating the Security Risks of Unified Communications

How to protect yourself from the threats posed by unified communications.

You Can't Manage What You Can't See

Looking into a SAN is murky business -- and usually unsuccessful.

Q&A: Virtualization -- From ROI to Optimization

From determining the ROI to ensuring you're getting the most from the technology, an infrastructure architect offers tips for IT professionals.

IT Spending Rises Despite Tough Economic Times

IT spending should eclipse $3.4 trillion this year -- a year-over-year growth rate of 8 percent

Network Security: How Employees and IT Can Keep Laptops Safe

Your employees may take the corporate laptop on summer holiday and bring back security risks to your network

Five Keys to Successful Change Management Maturity

IT must implement an effective, mature method of change management or experience significant downtime and negative impact on productivity and profits.

Security Software: How Suite It Is

Customers want integrated -- and highly manageable -- security tools. A smorgasbord of best-of-breed tools just can't get it done anymore