Enterprise


Simple Steps to IM Management

IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.

Cenzic Provides Risk Assessment of Risky Business

A new product provides enterprises with a risk assessment analysis that keeps everyone informed.

IBM Briefs Analysts on the Year Ahead

IBM mainframe chief Jim Stallings presents more evidence of a resurgence of Big Iron.

Analysis: A Closer Look at Sun’s Project Blackbox

Is Sun’s Blackbox a gimmick? Some analysts think there’s a lot more to it, but we’ll have to wait until it ships to be sure.

The Benefits of Going Virtual

Business continuity is critical, so operations must be up and running 24x7. Data center virtualization could be the key IT needs.

Texas Memory’s SSD: Ultimate Database Speed at a High Price (For Now)

More speed, lower failure rates, better encryption—sounds too good to be true

Podcast: A Holistic Approach to Compliance

Approaching compliance projects in an organized, holistic fashion can save IT time and frustration.



Case Study: Software Quality Controls Keep Game Site Purring

Online gaming company brings software development lifecycle under control

IBM Initiates Global Security Strategy

New IBM initiatives target hackers and insider threats in a single, complete security platform.

How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Behind IBM’s Mainframe Market Push

The best thing IBM can do to help secure the mainframe’s future is to roll up its sleeves and get to work, says one prominent Big Bluer

Paperless Office is Still a Far Cry from Reality

Six characteristics to look for in a solution to move your organization to the “paperless office” goal.

Oracle Plays Both Sides of the Mainframe/Distributed Divide

Regardless of whether customers opt for Linux-on-zSeries or choose to abandon the mainframe altogether, Oracle stands to benefit

Improving Business/IT Efficiencies with Enterprise Architects

How an enterprise architect can help you maximize your investment in BPM and BRE tools and other technologies.

Corporate Life or Death: Data Breach Triage

When disaster strikes and victims flood into an emergency room, doctors conduct triage to determine the severity of injuries and who gets treatment first. Companies can similarly prepare for the inevitable data breach by building a cross-disciplined incident team trained to assess the damage, stop the bleeding, and respond appropriately to regulatory bodies and customers.

Could Printers Be Your Biggest Insider Threat?

If you’re only as secure as your weakest link, printers could be your biggest threat.

Sun’s Virtualization Push

Project Blackbox might be a gimmick, but Sun’s virtualization moves are for real

Audits Address Overlooked Legacy Security

Guarding against external threats is important, but don’t overlook legacy systems security.

Productizing Storage Services the IBM Way

How do you help businesses better manage information and increase the performance of their database and storage-related infrastructures?

Aligning IT with Business Processes

Just as physical symptoms indicate underlying system imbalance in humans, an enterprise must be watchful of its technology and business warning signs.