Enterprise


Grocery Chain’s Data Breach Extends Security Debate

Over 1,800 known cases of fraud result from data breach

Report Urges IT: It’s Time to Guard against the "Millennial" Threat

New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem

Xiotech on the Right Path

Ask a dozen executives about the state of storage resource management and you’ll get ten different answers, but one company -- Xiotech -- has shown the way to true management nirvana with its Web services-based management architecture.

Five Steps to Successful IT Process Automation

Follow these five simple steps to make sure you’re ready to implement IT process automation

z10: Data Center in a Box?

For many large mainframe customers, the idea of a mainframe-centric -- or mainframe-exclusive -- "enterprise data center" makes a lot of sense

Fibre Channel Over Ethernet: The Promised SAN?

Will FCoE, which uses the same cabling as the next generation LAN, rapidly become the storage protocol of choice?

Web 2.0 Pushes Need for Defensive Application Development

The Web 2.0 paradigm shift is fraught with both promise and danger



Podcast: Securing Mobile Devices

Now that mobile devices are so ubiquitous among enterprise workers, IT must face up the security challenges they pose.

Analysis: System z10 Drastically Alters the Mainframe Market

Like the z9 EC and z9 BC systems that preceded it, IBM's System z10 drastically alters the rules of the mainframe game.

Keeping SOA Under Control

Runtime governance is the key to healthy SOA applications

Careers: IT Talent Still Matters

Organizations will continue to place a premium on acquiring, and keeping top IT talent even during a recession

Trustworthy Computing: Examining Trust

Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.

IT Outsourcing Faces Paradigm Shift

Increasingly, organizations are turning to IT outsourcing to enhance business outcomes instead of simply to control or reduce costs.

Accelerating Agility through Workload Automation

By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.

Podcast: The Impact of Mobile Devices on Enterprise IT

Mobile devices have moved beyond the domain of executives, but the rapid increase in use has been a drain on IT resources. Here’s how IT can fight back.

Mainframe's Rebirth, z10 Buzz Highlight SHARE Conference

This winter's SHARE conference was a user confab to remember, attracting young and old IT pros alike.

Laptop Security: Hackers Attack Encrypted Data on Chips

Sleeping laptops may be the next way hackers steal encrypted information

The Virtualization of I/O (Part 2 of 2)

In the second part of our discussion, we take a closer look at two I/O solutions: InfiniBand and 10 GbE.

Podcast: Automating Access Compliance

Automating user access and compliance can free IT to work on more pressing problems

Three Principles of Business Continuity

What does it take to successfully build a business continuity plan? It’s not the technology.