Enterprise


Mainframe Reseller Market Consolidates

A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?

Sanity Check on Tape, VTL, and De-Duplication

VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.

Ensuring Successful Application Performance

If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?

What Vulnerability Scanners Can’t Tell You

How to determine that your “secure environment” has all the bases covered.

Survey Says Insider Theft Tops CIO's Worry List

Why the threat of theft-from-within is keeping enterprise CIOs up at night

Managing Your Workforce’s Mobile Devices

The surge in mobile device usage is forcing IT to adopt new management techniques.

Federal Agencies Lag in Security Preparedness

When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut



Separating Truth from Hype about Unified Communications

We reveal three facts to keep in mind during any unified communications evaluation.

Analysis: IBM's POWERful New System

The data center impact of the new POWER 575 systems that IBM announced last month could be nothing short of radical

Another Mean Season Underway

Testing is where the rubber meets the road….and fewer than 50 percent of companies ever do it

SOA: It's the People, Process, and Orientation

Disputes between rival IT factions can stop an SOA project dead in its tracks

Vertica Appliance Puts Data Warehousing in the Cloud

With turnkey deployability and enterprise scalability, officials say Vertica-on-the-Cloud is a quick, painless, and inexpensive way to get into data warehousing

Business Service Management Dos and Don'ts

An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.

Uncovering the Dark Secrets of Dark Storage

Dark storage is disk space that is unmapped, unclaimed, or unassigned.

Gartner Warns about Problems in Outsourcing Help Desk

Outsourcing to cut IT costs may be a worthy goal, but not for your help desk, Gartner warns.

IT Process Automation

How to turn manual and mundane workflow processes into automated, error-free tasks

Latest Compliance Regulation Tackles Identity Theft for Enterprises Large and Small

Firms that extend credit to consumers and small businesses must comply by November 1

Securing a Virtualized Environment

Risks, rewards, and best practices

Security's Future: Letting the Good Guys In

It may not be long before businesses differentiate themselves on the basis of security

Why Projects Fail (And How to Avoid the Pitfalls)

You can't do everything. Here's how to make your project a success.