Rapid growth pushes software firm to a more mature development process
The challenge: securing an infrastructure you don’t control
Addressing the difficulties of both horizontal and vertical scalability has seen the rise of clustering techniques—but the question is where the brains for the cluster should reside.
IT must shift from developing backup strategies to developing reliable, easy-to-use recovery practices to ensure that data, applications, and operating systems can be recovered in a consistent format.
Setting a storage usage policy can be tricky
If there’s an economic recovery afoot, IT budgets haven’t benefited
A 2006 report from Boston-based market researcher Aberdeen Group shows 90 percent of survey respondents say their companies are adopting service-oriented architectures.
With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.
Want to learn AJAX from the ground up? Or polish your developer skills? A free online course begins Aug. 4.
A slew of new SOA management functions are available through a new version of CentraSite, including a plug-in that lets developers ease into integration within Eclipse-based dev environments.
One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.
Two key questions must be addressed: what do you back up and how do you do it?
What problems BPM solves, plus considerations in build-vs-buy decisions.
zLinux or Big Iron J2EE workloads perform better and are cheaper than their RISC- or Intel-based alternatives
Why organizations are increasingly adopting the IT Infrastructure Library
Simple disk-to-disk backup system yields reliable restores
How many new tricks can you teach an old pre-relational database? Plenty, especially if customers are still actively banking on it.
Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.
The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive