Enterprise


Ensuring Successful Application Performance

If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?

Mainframe Reseller Market Consolidates

A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?

What Vulnerability Scanners Can’t Tell You

How to determine that your “secure environment” has all the bases covered.

Survey Says Insider Theft Tops CIO's Worry List

Why the threat of theft-from-within is keeping enterprise CIOs up at night

Sanity Check on Tape, VTL, and De-Duplication

VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.

Managing Your Workforce’s Mobile Devices

The surge in mobile device usage is forcing IT to adopt new management techniques.

Federal Agencies Lag in Security Preparedness

When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut



Separating Truth from Hype about Unified Communications

We reveal three facts to keep in mind during any unified communications evaluation.

Analysis: IBM's POWERful New System

The data center impact of the new POWER 575 systems that IBM announced last month could be nothing short of radical

Another Mean Season Underway

Testing is where the rubber meets the road….and fewer than 50 percent of companies ever do it

SOA: It's the People, Process, and Orientation

Disputes between rival IT factions can stop an SOA project dead in its tracks

Uncovering the Dark Secrets of Dark Storage

Dark storage is disk space that is unmapped, unclaimed, or unassigned.

Gartner Warns about Problems in Outsourcing Help Desk

Outsourcing to cut IT costs may be a worthy goal, but not for your help desk, Gartner warns.

IT Process Automation

How to turn manual and mundane workflow processes into automated, error-free tasks

Vertica Appliance Puts Data Warehousing in the Cloud

With turnkey deployability and enterprise scalability, officials say Vertica-on-the-Cloud is a quick, painless, and inexpensive way to get into data warehousing

Latest Compliance Regulation Tackles Identity Theft for Enterprises Large and Small

Firms that extend credit to consumers and small businesses must comply by November 1

Business Service Management Dos and Don'ts

An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.

Securing a Virtualized Environment

Risks, rewards, and best practices

Security's Future: Letting the Good Guys In

It may not be long before businesses differentiate themselves on the basis of security

Quarterly Results Cast Shadow over Sun

Despite Sun’s poor economic showing recently, the atmosphere at last week’s JavaOne conference was surprisingly festive