Enterprise


Podcast: An Introduction to Application Virtualization

Hardware virtualization has one major drawback: your applications must run on the virtual machines you’ve defined. Imagine assigning virtual machines to applications as needed so they can always run at their best.

Three Resolutions for Storage 2008 (Part 2 of 2)

Why storage pros should focus on resiliency, manageability, and their "junk" drawer

Is Green IT Falling Drastically Short?

Why the current crop of Green IT initiatives isn't green enough

Reality Check: A Closer Look at System z's Late-2007 Stumble

Were System z's third-quarter shortfalls an aberration or a harbinger of a rough year ahead?

Bacn: Better than Spam but Still Clogging Inboxes

Classifying all messages as either spam or ham leaves a gaping hole that breeds confusion across the enterprise. Enter bacn.

Why Securing Mobile Devices Keeps CIOs Up at Night

With mobile security, the devil you don’t know can hurt you much more than the devil you think you know

Three Resolutions for Storage 2008 (Part 1 of 2)

Why relationship selling must stop



A Primer on Desktop Virtualization Using Thin Clients and Blade PCs

We explain the four major models of remote client solutions on the market today.

IM Security Exploits Explode in 2007

It's time to finally get serious about locking down IM

Big Blue Showcases Big Iron Solaris

Solaris running on the mainframe? It's far from a pipedream.

Protecting Your Enterprise from the Thriving Cyber Underground

Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.

Microsoft's Virtualization Strategy Coming Into Focus

Will Microsoft's server virtualization push change the rules of the game?

IT and Compliance: 5 Big Predictions for 2008

Service-oriented IT processes and technologies will help managers bring the enterprise into line in 2008—perhaps not a moment too soon. We can't shake the feeling that something big and very bad is lurking 'round the corner. Grab a security blanket and carefully read on for the hopes and horrors of 2008.

Podcast: Using Change Management to Move from Chaos to Control

When it comes to change management, chaos still reigns in IT. We explain how to regain control by implementing and administering an efficient change management system in your shop.

Podcast: Vulnerability Predictions for 2008

It’s been a tough year for protecting the enterprise. We review a security expert’s predictions for 2007, explore what’s been driving the rash of new vulnerabilities, and look ahead with him to the security problems that will dominate 2008.

Security in Review: Yesterday and Tomorrow

Will it be "same old, same old" in security for 2008?

What's In Store for Storage 2008

Disaster recovery tends to become a focus during any period of economic uncertainty -- and 2008 will deliver uncertainty in spades if market pundits are correct.

Enterprise IT: A Look Back, The Trends Ahead

Fasten your seatbelts -- it's going to be a bumpy year.

Careers: Downturn? What Economic Downturn?

The hiring outlook for early 2008 looks as solid as ever, with double-digit IT job growth forecast by at least one industry watcher

Research Reveals Steps to Protect Sensitive Data

A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.