Best practices for accessing corporate information remotely
On-demand application suite offers big benefits for a small company
Is ITIL tailor-made for the Six Sigma Generation?
IT must acknowledge the importance—and risks—of mobile computing tools and start building processes to protect corporate data.
How do we manage the combined output of all of the event logs produced by all the available, and frequently used, management tools?
The mainframe is entrenched for the long haul, respondents say
Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.
The full potential of tools to support knowledge work remains unrealized
A growing number of mainframe pros are trying to educate their colleagues and C-level executives about the business case for Big Iron.
Trying to reconcile the technologies and products offered by the storage industry with the actual problems confronting IT can seem like a thankless job.
Businesses need to be agile. An interconnect-driven server architecture may help. Here’s how.
New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?
Best practices to keep mobile and remote users safe
A new study shows spyware is the fastest-growing threat to enterprises.
Eight best practices to keep the user experience front and center during IT migration projects.
Data management should stand on its own as an umbrella effort driving all of IT’s efforts, because the essential task of IT is data management.
When is an economic recovery not an actual recovery? When it benefits the few at the expense of the many.
Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.
Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?
Storage consumes as much as one-third of an IT budget, but getting information about storage (especially storage utilization) has been difficult at best.