Mainframe adoption should continue to take off in both existing and emerging markets.
SIM adds real-time capabilities but compliance, not threats, stills drives this market
The power of a migration readiness assessment strategy framework is that it enables you to see what you are getting into with a data migration before you actually begin.
Since December, the US civil code has included electronically stored information (ESI) in its requirements for legal discovery. But surveys show most companies are unprepared to comply. What's the holdup, and how can companies move toward sustainable e-discovery management?
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
In terms of disasters, it's been an eventful few years with hurricanes, floods, earthquakes, and winter storms. However, the silver lining of every dark cloud is a lesson that can help you prepare for the next incident. Experts share valuable advice to bolster your business continuity plans and face the inevitable force majeure that could cripple your company.
CIOs expect to increase their IT staff levels at the fastest rate since 2001
Mainframe pros sound off about the year ahead
In less than 18 months, perpendicular recording has gone mainstream. It is one of those little-noted technology innovations, but one that is extraordinarily important.
Composite applications -- containing logic and data from multiple IT sources coupled with Web services standards -- bring higher end-user satisfaction without requiring full SOA implementation, a new research report reveals.
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
Views of tiered storage differ wildly because there is no clear, concise, universally accepted definition of the technology. We offer a definition that spells out the four attributes of tiered storage.
Both Compuware and IBM notched a pair of mainframe-related acquisitions
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
Harvesting business rules from a legacy application has benefits ranging from simple documentation to application modernization. We provide a practical approach for collecting rules in a process context.
The release of CERT information raises a controversy between storage security vendors.
The application server marketplace isn’t the exclusive playground of J2EE and .NET: CICS is amply represented, market watcher IDC says
With the data inside the data center secured, IT must now address the problems of a growing mobile work force. We discuss how enterprise data protection has changed and where it’s headed.
While many of these data centers may not perceive they are in the world of SOA, they have more than arrived. These are fully distributed applications that are growing in functionality and sophistication, becoming central to the business and in many cases achieving the rank of "mission-critical."
Do Big Blue’s mainframe TCO assertions add up?