Enterprise


Data Management and the Greening of IT

Going green isn’t just about using virtualization technologies or buying more energy efficient hardware.

Xiotech on the Right Path

Ask a dozen executives about the state of storage resource management and you’ll get ten different answers, but one company -- Xiotech -- has shown the way to true management nirvana with its Web services-based management architecture.

Five Steps to Successful IT Process Automation

Follow these five simple steps to make sure you’re ready to implement IT process automation

Report Urges IT: It’s Time to Guard against the "Millennial" Threat

New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem

z10: Data Center in a Box?

For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense

Fibre Channel Over Ethernet: The Promised SAN?

Will FCoE, which uses the same cabling as the next generation LAN, rapidly become the storage protocol of choice?

Podcast: Securing Mobile Devices

Now that mobile devices are so ubiquitous among enterprise workers, IT must face up the security challenges they pose.



Careers: IT Talent Still Matters

Organizations will continue to place a premium on acquiring, and keeping top IT talent even during a recession

Web 2.0 Pushes Need for Defensive Application Development

The Web 2.0 paradigm shift is fraught with both promise and danger

Analysis: System z10 Drastically Alters the Mainframe Market

Like the z9 EC and z9 BC systems that preceded it, IBM's System z10 drastically alters the rules of the mainframe game.

Keeping SOA Under Control

Runtime governance is the key to healthy SOA applications

IT Outsourcing Faces Paradigm Shift

Increasingly, organizations are turning to IT outsourcing to enhance business outcomes instead of simply to control or reduce costs.

Accelerating Agility through Workload Automation

By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.

Trustworthy Computing: Examining Trust

Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.

Podcast: The Impact of Mobile Devices on Enterprise IT

Mobile devices have moved beyond the domain of executives, but the rapid increase in use has been a drain on IT resources. Here’s how IT can fight back.

Mainframe's Rebirth, z10 Buzz Highlight SHARE Conference

This winter's SHARE conference was a user confab to remember, attracting young and old IT pros alike.

The Virtualization of I/O (Part 2 of 2)

In the second part of our discussion, we take a closer look at two I/O solutions: InfiniBand and 10 GbE.

Podcast: Automating Access Compliance

Automating user access and compliance can free IT to work on more pressing problems

Mainframe Pros Sound Off about System z10

This year's Winter SHARE conference -- held last week in Orlando -- gave attendees a unique opportunity to take System z10 for a test drive.

Laptop Security: Hackers Attack Encrypted Data on Chips

Sleeping laptops may be the next way hackers steal encrypted information