Enterprise


Three Principles of Business Continuity

What does it take to successfully build a business continuity plan? It’s not the technology.

Microsoft Touts Windows Server 2008

Microsoft releases its next-generation Windows platform, highlighted by Windows Server 2008.

Podcast: Putting Retrospective Network Analysis to Work

Troubleshooting network problems can be a nightmare, but RNA can help.

When Application Management Collides with SOA

As applications get more distributed and complex, enterprises need to consider tools that handle application service modeling and mapping for change management.

The Resurgence of Data Integration

Data integration vendors cite growing interest among new and existing customers in mainframe data connectivity solutions.

Build a Reuse Framework for SOA

Some say the benefits of reuse are exaggerated. Prove them wrong by implementing a plan of action.

The Virtualization of I/O (Part 1 of 2)

As companies virtualize physical servers and provision processor and memory resources to specific virtual machines (VMs), delivering I/O to these VMs presents the next set of challenges. We examine these and look at two I/O solutions: InfiniBand and 10 GbE.



A Nickel's Worth of Disaster

Are you willing to spend a nickel to avoid a data recovery disaster?

Event Data Management Software: A Vital Tool for Tackling the PCI Challenge

Though the security standard for processing credit cards has passed, and IT has adjusted, pitfalls remain.

Disaster Recovery Planning Lags

How long is the DR-related outage you budget for? A few days -- a week -- or longer?

A Storage Operating System for the Masses?

Real storage innovation may be happening in software, not hardware

Podcast: Security and Managed File Transfers

We’ve all attached a file to an e-mail, but enterprises need a way to transfer large files securely. To explain the requirements, approaches, and options, we spoke with Ellen Ohlenbusch at GlobalSCAPE

Deduplicaton: Five Key Questions Help You Find the Right Solution

Deduplication on virtual tape libraries is a hot technology. Before jumping in, however, you’ll need answers to five important questions.

Hackers Using Time-Tested Methods, Not Fancy Technology

ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches

Operational BI: Getting “Real-Time” about Performance

A new survey sheds light on how enterprises are using and benefiting from operational BI

Return to Direct Attached Storage for DreamWorks

Is IBRIX truly a vendor-agnostic technology that can dramatically improve data access speeds?

Big Blue's Cognos Acquisition Comes More Clearly Into Focus

IBM is aiming its Information-on-Demand pitch to both IT professionals and business decision-makers

Reported Drop in Security Threats Masks Their Severity

The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.

Podcast: Self-Learning Performance Management

How is your IT environment performing? A new class of performance management software helps you look for patterns and spot abnormalities.

Visual Studio 2008: Collaboration is Key

With Visual Studio 2008, Microsoft's developer-friendly focus continues apace -- with some new wrinkles