In the face of mounting pressure from IBM, CA officials say their revamped tools still provide plenty of value-added bang for the buck.
Answer these seven critical questions to achieve greater success with a new master data governance program.
Symantec Veritas CommandCentral is building a strong infrastructure monitoring and management approach that is worth a look.
TCO and ROI efforts can be misleading -- in part because they tend to over-generalize the needs of particular customers and apply them to the market as a whole.
At $250 million over five years, the projected savings are real and substantial -- and the PR benefits, especially for System z, are even more important.
Rowing though the backwaters may keep you more secure
How cybercriminals are changing the way they target IT assets
There’s still plenty of life left in Big Blue’s midrange server line
SHARE recently announced a list of five disaster recovery and business continuity recommendations that it says all mainframe shops would do well to follow.
A greater use of the "delete" key may be the greenest data strategy of all.
The future of business demands more than just links between IT and business.
Security isn’t a current stumbling block for Oracle 11g and Applications Security Inc. represents a breed plugging database security gaps
In the conclusion of our three-part series, we examine JCL emulation products and review the status of job scheduling products for the Windows platform.
The Fortunes may soon smile on the combination of Postini’s communications security and Google’s SOA.
In the second part of our three-part series on workload automation, we compare mainframe- and distributed-based job schedulers.
IBM’s acquisition of DataMirror’s technology will likely find its way into the company’s DB2 database
The reorganization could revitalize a System i business that is in need of a jumpstart, analysts say.
How intelligent archiving utilizes intelligent classification and retention technologies while reducing storage costs and simplifying management.
Confusing encryption with data storage security can be dangerous to your storage protection strategy.
Agile development’s benefits are considerable, but the approach may not be right for every project.