Enterprise


Case Study: Software Lifecycle Management Tools Get a Handle on Change

Rapid growth pushes software firm to a more mature development process

Case Study: SUNY-Buffalo Health Science Schools Aim for Network-Admission Controls

The challenge: securing an infrastructure you don’t control

Building Storage Part I: A Device-Driver Approach

Addressing the difficulties of both horizontal and vertical scalability has seen the rise of clustering techniques—but the question is where the brains for the cluster should reside.

Backup/Recovery Strategies: Moving to Recovery Management(Last in a 3-part Series)

IT must shift from developing backup strategies to developing reliable, easy-to-use recovery practices to ensure that data, applications, and operating systems can be recovered in a consistent format.

Podcast: Best Practices for Personal-Use Storage Policies

Setting a storage usage policy can be tricky

Companies Stingy About IT Spending, Gartner Reports

If there’s an economic recovery afoot, IT budgets haven’t benefited

Aberdeen Research Points to SOA's Suite Spot

A 2006 report from Boston-based market researcher Aberdeen Group shows 90 percent of survey respondents say their companies are adopting service-oriented architectures.



Scan for Security Issues While Building Apps

With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.

Free AJAX 101 Workshop Offered

Want to learn AJAX from the ground up? Or polish your developer skills? A free online course begins Aug. 4.

SOA Solution Offers Free Management Options

A slew of new SOA management functions are available through a new version of CentraSite, including a plug-in that lets developers ease into integration within Eclipse-based dev environments.

SIM Software Aims for SMBs

One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.

Backup/Recovery Strategies: Protecting Networked Workstations (Part 2 of a 3-part Series)

Two key questions must be addressed: what do you back up and how do you do it?

Podcast: Inside Business Process Management

What problems BPM solves, plus considerations in build-vs-buy decisions.

The Mainframe Capacity Conundrum Revisited

zLinux or Big Iron J2EE workloads perform better and are cheaper than their RISC- or Intel-based alternatives

Q&A: Regulations and Security Drive Organizations to Adopt Frameworks

Why organizations are increasingly adopting the IT Infrastructure Library

Case Study: Easier Small-Business Backups

Simple disk-to-disk backup system yields reliable restores

CA Teaches Old Databases New Tricks

How many new tricks can you teach an old pre-relational database? Plenty, especially if customers are still actively banking on it.

Security Briefs: Breaches Increase, Trojans Displace Worms

Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.

Five Tips for Securing VoIP

Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.

Distributed Computing, Specialty Engines Bring Companies Back to the Mainframe

The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive