Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now
What Big Iron shops of all sizes have to say about the future of the mainframe is encouraging—to say the least
Match your knowledge with In-Stat’s latest broadband report.
Many market observers might yawn at SAP’s recent Premium Support announcement, but users increasingly appreciate more choice and certainty, and may take notice of what the market leader is trying to do with this middle-of-the-road support option.
From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.
The fur will fly as Centera flaws are exposed
CA says it has developed a change management product family the integrated whole of which is much greater than the sum of its parts
Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.
Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.
A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
How to maximize system availability in a Web-enabled environment
Big Blue announced initiatives to help programmers and ISVs get that old-time mainframe religion
How a pair of protocols and unique interconnect software can lead the way to inexpensive storage
BPM is both a management discipline and a technology platform; modeling complements -- and is a critical aspect of -- a larger BPM strategy.
If you want to make the most of your vacation, you should be working in a Big Iron shop.
Options proliferate for encrypting your z/OS backup tapes
Forget the tape versus multi-hop-mirroring battle. Our storage analyst, Jon Toigo, has some suggestions.
What’s the best way to stop users from inadvertently compromising your company’s information security?
From Wikis to mash-ups, users are taking development into their own hands as never before.
Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.