Mainframe shops plan to expand their capacities and aggressively expose their Big Iron assets via service-oriented architectures
Whitelisting isn’t just useful for blocking an avalanche of unwanted e-mail. It’s now being used to secure systems by limiting what applications are allowed to run.
When politics and storage collide, the results are too often unpredictable and unnerving.
A trojan targeting Monster.com shows that protection from the center to the edge -- and beyond -- is still needed.
Sun’s next-gen multicore design boasts a number of enhancements -- including dedicated FPUs for each core -- which make it a better overall processor.
There’s a growing consensus -- among IBM users, at least -- that Big Iron’s biggest selling point might well be its proven security model.
To stay in compliance, IT has had to focus on ensuring the right data is saved for the right length of time. A new court case may extend what data must be saved in the future. Regardless of the outcome of that case, we explore three steps IT must take to be prepared when lawsuits arise.
Do you know if your disaster recovery processes are up to date?
Troubleshooting network problems is easier thanks to retrospective network analysis, tools that let you go back in time to reconstruct failures.
The bad guys are targeting consumers, but enterprises still pay
Web 2.0 features give Notes 8 a collaborative edge; industry watchers applaud its platform underpinnings
Big Blue’s vision: a System z-centered security hub—along the lines of the mainframe-based Information hubs it’s been touting for a year now.
IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.
In addition to recognizing Novell’s ownership of Unix and Unixware, the court’s ruling could also let IBM off the hook
The downside of thin provisioning at the array level is not being fully articulated by any vendor.
Thanks to its reputation for resiliency, the mainframe is widely viewed as the preeminent platform for disaster recovery and business continuity planning.
Princeton Softech gives Big Blue new access and connectivity features for a variety of non-IBM data sources.
Best-in-class companies are tackling the shortage of BI skills head-on, according to new research from the Aberdeen Group.
Web apps are the next frontier for hackers. Learn what IT must do to stay protected.
It should come as no surprise that new companies have begun to carve out a part of the storage market for themselves.