IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
A new product provides enterprises with a risk assessment analysis that keeps everyone informed.
IBM mainframe chief Jim Stallings presents more evidence of a resurgence of Big Iron.
Is Sun’s Blackbox a gimmick? Some analysts think there’s a lot more to it, but we’ll have to wait until it ships to be sure.
Business continuity is critical, so operations must be up and running 24x7. Data center virtualization could be the key IT needs.
More speed, lower failure rates, better encryption—sounds too good to be true
Approaching compliance projects in an organized, holistic fashion can save IT time and frustration.
Online gaming company brings software development lifecycle under control
New IBM initiatives target hackers and insider threats in a single, complete security platform.
New study shows disconnect between executives' understanding and action
The best thing IBM can do to help secure the mainframe’s future is to roll up its sleeves and get to work, says one prominent Big Bluer
Six characteristics to look for in a solution to move your organization to the “paperless office” goal.
Regardless of whether customers opt for Linux-on-zSeries or choose to abandon the mainframe altogether, Oracle stands to benefit
How an enterprise architect can help you maximize your investment in BPM and BRE tools and other technologies.
When disaster strikes and victims flood into an emergency room, doctors conduct triage to determine the severity of injuries and who gets treatment first. Companies can similarly prepare for the inevitable data breach by building a cross-disciplined incident team trained to assess the damage, stop the bleeding, and respond appropriately to regulatory bodies and customers.
If you’re only as secure as your weakest link, printers could be your biggest threat.
Project Blackbox might be a gimmick, but Sun’s virtualization moves are for real
Guarding against external threats is important, but don’t overlook legacy systems security.
How do you help businesses better manage information and increase the performance of their database and storage-related infrastructures?
Just as physical symptoms indicate underlying system imbalance in humans, an enterprise must be watchful of its technology and business warning signs.