IT standardization is a necessity, but it’s time for a new, non-traditional approach
We explore the problems and best practices for managing a remote location for disaster recovery.
We offer prudent best practices that minimize risk and are broadly acknowledged with widespread use because they work.
Industry watchers see Big Blue’s mainframe power efficiency push as a signal event in the longstanding scale-up versus scale-out system wars
How problem solving is different in mainframe and non-z/OS environments, and how you can accelerate troubleshooting convergence.
Marketing can lead IT down a dangerous garden path when it comes to tape encryption standards
When it comes to change management, do ITIL and CMDBs make a difference?
Industry analysts say the IBM/Mainsoft accord is a Very Good Thing for users of mixed .NET and J2EE environments
While reacting to changes in the market, a health care services company has proactively tightened down security beyond HIPAA and aims for certification on the relatively tough ISO 27001 standard.
Earlier this month Microsoft committed to a very sudden about-face on its virtualization strategy
Compliance applies to the entire infrastructure, even the many crannies of heterogeneous environments.
How IT can create test cases from production data
If IT organizations don’t start embracing alternative delivery models, they’ll risk being bypassed by the line of business
Industry standards and trusted hardware keep out unauthorized users and equipment
Once dismissed by the storage industry analyst community, DataCore is enjoying a renaissance in the U.S. market. We explain why.
Learn the 10 best practices for access management collaboration.
There are better ways than cut-and-paste to share data between applications.
IBM’s new Rational offerings make it easier for customers to expose COBOL assets as Web services and automatically generate COBOL or Java code
Economic uncertainty got you down? You’re not alone. Gartner says you need to start thinking now about a potentially tumultuous 2008.
How much is storage compromised by simply adding more of the same?