Enterprise


Active Directory in Vista: Same Name, Substantial Changes

Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.

Careers: CEO Compensation Leaves Rank-and-File Workers in the Dust

Corporate chiefs still earn significantly more than IT staff—although the gap <em>has</em> narrowed

The Search for Universal Data Classification

You can’t optimize capacity utilization until you understand the data you’re storing.

Managing Data Center Performance and Availability (Part 1 of 2)

As companies become ever-more reliant on IT, system availability becomes essential. Application performance management tools can help.

Why Microsoft and Oracle Want to Be Your One-Stop Shop for BI

What IBM should do to prevent their BI market dominance

Security Lax with Wireless Routers

Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.

IT Spending: From Boom to Bust

A recent about-face from market watcher IDC on the IT spending front highlights the still-fragile state of the IT recovery



Second Generation Continuous Data Protection—Your Data Will Thank You

The first generation of continuous data protection relied on tape; in today’s networked world, that could be dangerous.

Podcast: The Changing Nature of Data Storage

Data storage has moved beyond managing transactions in a database. We explore the changing nature of data, conventional and clustered storage, and the business value of a new class of storage technologies.

Careers: IT Pros Sound Off on Offshore Outsourcing

IT pros are surprisingly nuanced in their objections to, or support of, offshore outsourcing.

ES Reader Survey: Still Time to Participate

Your responses to our Reader Survey will help us make ESJ a more valuable resource in your IT toolkit.

Backup-Tape Security: Enter the “Brown Bag”

Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.

Readers Speak Up

Readers are on the right wavelength when it comes to their storage concerns.

New York Sues Over Alleged Spyware

Speaking a language spyware purveyors understand: fines and jail time

Podcast: What’s New at Storage Networking World

The largest conference devoted to storage networking wrapped up last week. We learn what’s new and what caught our storage analyst’s eye—plus news of a new disaster recovery summit.

Podcast: Security and Hosted Applications

How secure are those online applications?

The Attack from Within: Stopping Malicious Insiders

While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.

IT Shops Turn to "Blended Sourcing"

In spite of an economic recovery, it isn’t quite business as usual—or business-circa-1999—for beleaguered North American IT pros

More Vista Security Details Emerge, But Will Enterprises Bite?

The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.

Careers: IT Pros Now Outsourcing Service Providers

Some mainframe and minicomputer programming vets have embarked on a very different career path—as outsourcing services providers