Enterprise


Survey Says: Mainframe and SOA are Hot

Mainframe shops plan to expand their capacities and aggressively expose their Big Iron assets via service-oriented architectures

Podcast: How Whitelists Can Protect Your Enterprise

Whitelisting isn’t just useful for blocking an avalanche of unwanted e-mail. It’s now being used to secure systems by limiting what applications are allowed to run.

Why Politics and Storage Don’t Mix

When politics and storage collide, the results are too often unpredictable and unnerving.

A Monster Lesson: Security Must Be Everywhere

A trojan targeting Monster.com shows that protection from the center to the edge -- and beyond -- is still needed.

Analysis: Lifting the Hood on Sun’s New UltraSPARC T2 Chip

Sun’s next-gen multicore design boasts a number of enhancements -- including dedicated FPUs for each core -- which make it a better overall processor.

Mainframe Proponents Talk Up Platform’s Security Strengths

There’s a growing consensus -- among IBM users, at least -- that Big Iron’s biggest selling point might well be its proven security model.

Avoiding the RAMifications of Storage Retention

To stay in compliance, IT has had to focus on ensuring the right data is saved for the right length of time. A new court case may extend what data must be saved in the future. Regardless of the outcome of that case, we explore three steps IT must take to be prepared when lawsuits arise.



Pushbutton Disaster Recovery

Do you know if your disaster recovery processes are up to date?

Reverse Network Analysis: Simple Solutions for Complex Networks

Troubleshooting network problems is easier thanks to retrospective network analysis, tools that let you go back in time to reconstruct failures.

Why IT Security Must Combat Organized Cybercrime

The bad guys are targeting consumers, but enterprises still pay

Big Blue Unveils Next-Gen Notes

Web 2.0 features give Notes 8 a collaborative edge; industry watchers applaud its platform underpinnings

How IBM’s Updated z/OS Improves Security

Big Blue’s vision: a System z-centered security hub—along the lines of the mainframe-based Information hubs it’s been touting for a year now.

IPLocks Tackles Database Security

IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.

Analysis: The Beginning of the End for SCO?

In addition to recognizing Novell’s ownership of Unix and Unixware, the court’s ruling could also let IBM off the hook

Thin Is In -- Or Is It?

The downside of thin provisioning at the array level is not being fully articulated by any vendor.

SHARE Conference Focuses on Disaster Recovery, Mainframe Resiliency

Thanks to its reputation for resiliency, the mainframe is widely viewed as the preeminent platform for disaster recovery and business continuity planning.

Behind Big Blue’s Ever-Expanding Information Management Portfolio

Princeton Softech gives Big Blue new access and connectivity features for a variety of non-IBM data sources.

How Best-in-Class Enterprises Solve BI Skill Shortages

Best-in-class companies are tackling the shortage of BI skills head-on, according to new research from the Aberdeen Group.

Podcast: Web Application Security

Web apps are the next frontier for hackers. Learn what IT must do to stay protected.

Of Knee-Nippers and Ankle-Biters

It should come as no surprise that new companies have begun to carve out a part of the storage market for themselves.