We explore what factors are important when organizations choose their outsourcing partners. Price isn’t the primary consideration.
Successful service-enablement requires a high degree of visibility into an organization’s IT inner workings.
Disaster recovery was once a one-stop proposition. No more.
New standard specifies XML framework for identity management and provisioning
In the age of IP standards, what should IT do to secure its network?
Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.
Looking for a new or better job? Certification may not be high on your potential employer's wish list.
We explore why organizations choose to outsource, where they move it, their use of multiple vendors, and success factors in choosing a service provider
For a starting price of $100,000, customers get Big Iron hardware and software along with specialty processor engines
We explore what IT is outsourcing, how much it costs, and the length of outsourcing contracts.
With IM use increasing 200 percent per year, unmanaged enterprise IM is a growing security risk. Plus, Check Point pushes one-console management for perimeter, internal, Web, and endpoint security.
The key to getting the most from legacy systems and not being tied down by them may be business automation software.
Patching remains a manual, time-intensive process, despite more automated tools.
How well does Big Blue's highly virtualized Intel server vision compare with mature implementations available on System z or RISC/Unix?
While there may be no complete solution to content-and-context -managed storage problem, two vendors have interesting products that worth a look.
CA's new all-in-one DBMS administration console can manage distributed and mainframe databases. The price is right, too: it's free.
VeriTest, an independent testing lab, pitted three popular anti-spyware products against each other for four months, but such performance results can be problematic.
Industry watchers say we’ll soon see explosive interest in server virtualization
Life as an independent contractor isn't all it's cracked up to be
In the second of a two-part series, we explore best practices for protecting against downtime and data loss.