Companies are on a collision course in the enterprise data warehouse space
Storage security needs a more systemic view to succeed.
New feature lets coders use static SQL for scenarios in which they might otherwise depend on dynamic SQL
IBM claims that its new System p p570 offers three times the performance of a comparable Superdome system from HP
Our storage analyst, Jon Toigo, begins a series on data security issues and solutions.
Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.
IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.
A new nonprofit industry group works to push IEEE 802.1x as the basis for open source client-side security.
Despite mature technologies from firewalls to antivirus, and in the face of heightened user expectations and business needs, keeping your enterprise secure is harder than ever. Darknets offer an effective way to increate your security intelligence.
Globalization is ushering in a new era of competition – for talent. As a result, organizations will be hard-pressed to attract and retain key IT talent
Is the obvious so difficult to understand? Obviously, yes.
Big Blue’s Project Big Green is one of the most ambitious energy-focused IT offerings yet
Moving to a virtualized environment can improve the efficiency of your IT infrastructure. We explain how to determine the best configuration for your environment.
PSI officials pledge to indemnify customers against liability and expect a return to normalcy -- post-litigation -- with Big Blue.
From speed to XML parsing, several factors must be addressed to improve a server’s ability to reliably serve real-time data. We explain what you need to know.
There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?
Although the spotlight tends to shine on the poor grades federal agencies receive for their information security efforts, notable security successes in government are often overlooked.
Microsoft’s recent flurry of security acquisitions finally results in a product announcement: Microsoft Forefront Client Security.
IT organizations must come to terms with SOA’s much more rigorous planning, testing, and management requirements
What every storage admin must ask: what must we save and where shall we save it?