If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?
A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
How to determine that your “secure environment” has all the bases covered.
Why the threat of theft-from-within is keeping enterprise CIOs up at night
VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.
The surge in mobile device usage is forcing IT to adopt new management techniques.
When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut
We reveal three facts to keep in mind during any unified communications evaluation.
The data center impact of the new POWER 575 systems that IBM announced last month could be nothing short of radical
Testing is where the rubber meets the road….and fewer than 50 percent of companies ever do it
Disputes between rival IT factions can stop an SOA project dead in its tracks
Dark storage is disk space that is unmapped, unclaimed, or unassigned.
Outsourcing to cut IT costs may be a worthy goal, but not for your help desk, Gartner warns.
How to turn manual and mundane workflow processes into automated, error-free tasks
With turnkey deployability and enterprise scalability, officials say Vertica-on-the-Cloud is a quick, painless, and inexpensive way to get into data warehousing
Firms that extend credit to consumers and small businesses must comply by November 1
An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.
Risks, rewards, and best practices
It may not be long before businesses differentiate themselves on the basis of security
Despite Sun’s poor economic showing recently, the atmosphere at last week’s JavaOne conference was surprisingly festive