Business leaders are focusing on strategic technologies, including BI, Web-based apps, and vertical solutions
The fur will fly as Centera flaws are exposed
Match your knowledge with In-Stat’s latest broadband report.
From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.
Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.
What Big Iron shops of all sizes have to say about the future of the mainframe is encouraging—to say the least
CA says it has developed a change management product family the integrated whole of which is much greater than the sum of its parts
Many market observers might yawn at SAP’s recent Premium Support announcement, but users increasingly appreciate more choice and certainty, and may take notice of what the market leader is trying to do with this middle-of-the-road support option.
Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.
How to maximize system availability in a Web-enabled environment
Big Blue announced initiatives to help programmers and ISVs get that old-time mainframe religion
BPM is both a management discipline and a technology platform; modeling complements -- and is a critical aspect of -- a larger BPM strategy.
If you want to make the most of your vacation, you should be working in a Big Iron shop.
Options proliferate for encrypting your z/OS backup tapes
How a pair of protocols and unique interconnect software can lead the way to inexpensive storage
A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
We explore what factors are important when organizations choose their outsourcing partners. Price isn’t the primary consideration.
What’s the best way to stop users from inadvertently compromising your company’s information security?
From Wikis to mash-ups, users are taking development into their own hands as never before.
Forget the tape versus multi-hop-mirroring battle. Our storage analyst, Jon Toigo, has some suggestions.