Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.
Corporate chiefs still earn significantly more than IT staff—although the gap <em>has</em> narrowed
You can’t optimize capacity utilization until you understand the data you’re storing.
As companies become ever-more reliant on IT, system availability becomes essential. Application performance management tools can help.
What IBM should do to prevent their BI market dominance
Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.
A recent about-face from market watcher IDC on the IT spending front highlights the still-fragile state of the IT recovery
The first generation of continuous data protection relied on tape; in today’s networked world, that could be dangerous.
Data storage has moved beyond managing transactions in a database. We explore the changing nature of data, conventional and clustered storage, and the business value of a new class of storage technologies.
IT pros are surprisingly nuanced in their objections to, or support of, offshore outsourcing.
Your responses to our Reader Survey will help us make ESJ a more valuable resource in your IT toolkit.
Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.
Readers are on the right wavelength when it comes to their storage concerns.
Speaking a language spyware purveyors understand: fines and jail time
The largest conference devoted to storage networking wrapped up last week. We learn what’s new and what caught our storage analyst’s eye—plus news of a new disaster recovery summit.
How secure are those online applications?
While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.
In spite of an economic recovery, it isn’t quite business as usual—or business-circa-1999—for beleaguered North American IT pros
The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.
Some mainframe and minicomputer programming vets have embarked on a very different career path—as outsourcing services providers