Enterprise


Compliance and Security, Part 2: Uniting Efforts

In the second of three parts, unifying security, compliance, and risk assessment get better results

Compliance and Security: The Changing Environment, Part 1

In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk

Why Legacy Databases Are Here to Stay

While industry watchers once encouraged customers to think about transitioning away from pre-relational DMBSes, they’re now backtracking

The Greening of IT: More than a Passing Fad

A vendor’s "greenness" matters to IT executives says research firm IDC

Podcast: Application Modernization Strategies

You don’t have to rewrite or rip-and-replace you legacy apps to make them more useful.

How New Technologies Improve E-Mail Control

Lexicon-based and random reviews address only part of the need to internally monitor e-mail. We explain how, to be complete, a message's context must be examined.

Building Storage Shouldn’t Be Trick or Treat

Storage purchasing with an eye toward promised "treats" may ignore the "tricks" that follow.



The Real Storage Crisis

A patent infringement case may be just the impetus IT needs to initiate data management projects.

Big Iron Coup: IBM Touts New Mainframe Data Integration Software

Information Server seems tailor-made for Big Blue’s bring-it-all-back-home to System z philosophy -- particularly with respect to data processing workloads.

Making Smart Decisions: The Role of Key Performance Indicators

A new Aberdeen study offers guidance for executives and business managers to get the most out of key performance indicators when making decisions.

ITIL: Weighing the Pros and Cons (Part 2 of 2)

In the second article in our two-part series, we explain why adopting the IT Information Library may not be right for your organization.

An Operating System Reloaded: IBM Preps Major z/VSE Overhaul

Next version of z/VSE looks like an operating system reborn

Minding the Network Behavior

Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?

Breaking Through the Cyberattack Noise with SIEM

Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats.

The Five Trends IT Must Tackle

Let innovation happen with Web 2.0 applications and software-as-a-service delivery, Gartner advises.

Analysis: A Closer Look at IBM’s Green IT Initiatives

There’s gold in eco-friendly IT, industry watchers argue, and -- more than meets the eye -- the mainframe has a big Green IT story to tell.

Accelerating File Transfers in the Mid-Size Enterprise

The mid-size enterprise needs simple, fast, reliable, and secure ways to transfer large files. PDP and UDP technologies may provide the answer.

The Elusive Integrated Archive Stack

We can’t expect vendors to solve all our problems. Sometimes we have to do the heavy lifting ourselves.

ITIL: Weighing the Pros and Cons (Part 1 of 2)

In the first article in our two-part series, we look at the promised benefits of adopting the IT Information Library in your organization.

Fixing the PCI Encryption Problem

Fines and fees are looming after the September 30 PCI compliance deadline. Still, less than half of merchants report full compliance with PCI security requirements, and encryption failures contribute to four out of five failed PCI audits. Why can't companies get encryption right? Here are five key steps for overcoming encryption hurdles.