Enterprise


Neon Upgrades, Extends IMS Toolset

Customers are still betting their businesses on IMS and other “legacy” datastores—and mainframe ISVs are more than happy to oblige.

Five Steps to Strategic IT Management

How IT managers can make themselves more strategic and create more value for their organization

Reducing Off-site Storage Risks: What You Need to Do Now

The off-site storage industry continues to lack a common set of best practices to describe the services they provide or ways to measure service delivery.

New Software to Secure SOA-driven Apps

Security remains a key reason some developers shy away from service-oriented architectures. IBM’s new release may help change that.

Securing Visitors with Guest-Access Controls

A defense contractor turns to admission controls to meet government requirements to secure national security information.

Best Practices: Building a Test-Driven Development Team

More and more code jockeys are embracing software testing as a means to accelerate development and improve overall quality levels

Indian Outsourcers Vie for Global Dominance

The worldwide market for IT services is booming—and the largest Indian services providers now threaten the market share of top global players



2006 ESJ Salary Survey, Part 3: The Northeast, Larger Firms Pay the Most for IT Skills

In the third of our four-part report, we look at compensation by company size, industry, and region.

Podcast: Why Metadata Mapping Isn’t Enough

To understand your corporate data and business rules, you need more than a metadata map.

IBM Nabs FileNet, Secures its Place in Content Management MarketPlace Holder

FileNet gives Big Blue best-of-breed technology, a huge installed base, and a steady stream of revenue.

Platform Usage Models -- A Grid Computing Example (Part 3 of 3)

Grid system complexity can tie an organization in knots in an endless debate trying to justify a deployment. The Hierarchical Usage Model Framework may help.

JavaScript Security Vulnerabilities: Weakness in Web 2.0

Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.

Primary Source: An Outsourcing Decision Stands the Test of Time

How one company learned if their outsourcing decision was the right one.

SNIA’s Information Lifecycle Management Paper Reads Like a Beach Novel

Like a summertime guilty-pleasure-but-pointless novel, and SNIA’s latest document on information lifecycle management makes for nice beach reading.

Survey: Windows XP Top Security Concern

Symantec survey focused on IT professionals’ views on vulnerability research and challenges they expect in the next year.

Case Study: Implementation Partner Helps Smooth Financial Merger

A financial advisory firm brings in an integration partner to help expand its financial systems

Q&A: How Security Budgets Determine Compliance Success

New study highlights commonalities between companies with the fewest IT compliance deficiencies.

Podcast: Trusted Computing

Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives

2006 Salary Survey, Part 2: Raises for IT Executives and Managers Remain Tepid

An improving economy and more robust IT budgets are helping loosen the budget purse strings for key IT line staff positions but not for key management positions surveyed.

Analysis: IBM Takes the Opteron Plunge

With Intel finally righting itself after years of floundering in AMD’s wake, why did IBM pick now to take the Opteron plunge?