Enterprise


IMS at a Crossroads?

Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now

Worker Shortage May Stymie Strong Mainframe Growth

What Big Iron shops of all sizes have to say about the future of the mainframe is encouraging—to say the least

Test Your Knowledge of Broadband Use

Match your knowledge with In-Stat’s latest broadband report.

Analysis: Enterprise Applications Giant Introduces a Mid-tier Support Choice

Many market observers might yawn at SAP’s recent Premium Support announcement, but users increasingly appreciate more choice and certainty, and may take notice of what the market leader is trying to do with this middle-of-the-road support option.

Q&A: Achieving More Value from Enterprise Applications

From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.

Herding CA(T)S Caringo Launches Software-Only CAS Solution

The fur will fly as Centera flaws are exposed

Integration Key in CA’s Approach to Change Management

CA says it has developed a change management product family the integrated whole of which is much greater than the sum of its parts



CIOs Lack Content Control; Spyware Guns for SMBs

Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.

Best Practices for Effective URL Filtering and Monitoring

Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.

2007 Tech Budgets to Decline; Stealth Malware on the Rise

A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.

Podcast: Managing Availability

How to maximize system availability in a Web-enabled environment

Behind Big Blue’s SOA/Mainframe Blitz

Big Blue announced initiatives to help programmers and ISVs get that old-time mainframe religion

Really Big Storage on the Cheap

How a pair of protocols and unique interconnect software can lead the way to inexpensive storage

SOA, BPM and Model-driven Development: Creating the Perfect IT Storm

BPM is both a management discipline and a technology platform; modeling complements -- and is a critical aspect of -- a larger BPM strategy.

Careers: The Vanishing Vacation

If you want to make the most of your vacation, you should be working in a Big Iron shop.

CA Rolls Out Tape Encryption for Mainframes

Options proliferate for encrypting your z/OS backup tapes

A Season of Disasters: The Signs Are There

Forget the tape versus multi-hop-mirroring battle. Our storage analyst, Jon Toigo, has some suggestions.

Employees Cause Most Security Breaches, Yet Response Lags

What’s the best way to stop users from inadvertently compromising your company’s information security?

Podcast: Situational Application Development

From Wikis to mash-ups, users are taking development into their own hands as never before.

Q&A: Stopping Blended Threats with Multi-Function Security Appliances

Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.