Active-Circle says it provides a centralized mechanism for establishing policy-based management across your existing network-attached infrastructure. We take a closer look.
While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.
Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.
Seagull Software’s Andre Den Haan isn’t a knee-jerk contrarian—but he also isn’t afraid to call it as he sees it
Spring cleaning is a reminder to get busy with long-delayed projects, including several projects we ought to be initiating today to improve our storage infrastructure for the rest of the year.
The advance of grid computing will bring in new capabilities, cut costs dramatically, enable increasingly ambitious projects, and offer more advanced capabilities to customers. While the implementation details are different for each industry, some strategies are common to all. We explore three strategies.
Oracle enters the already-crowded enterprise search market, as IT moves to supply fast but secure search results.
We explore industry verticals that are are pioneers in grid adoption or illustrate significant, untapped benefits from grid adoption.
Can MOM—a manager-of-managers for data archives—really make it all better?
Organizations want to proactively identify and retain top employee performers before they can be identified and potentially wooed away by rivals.
IBM's vision puts the mainframe in the center of a distributed application ecosystem that consumes data served up by zIIP workload engines
Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.
While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.
Bot networks are behind the rise in malicious code aimed at capturing sensitive information. Also, IM attacks decrease during February.
The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.
The only way to solve the seemingly intractable problems of storage management is to do so strategically.
A core capability of the grid is parallel distributed computation—scaling application performance beyond what is possible with one computer or grid “node.” Unfortunately, most applications today don’t take advantage of parallel computing.
What’s not to like about z/Linux and other cheap mainframe workloads?
Fully 12 percent of CIOs expect to hire new IT workers in the upcoming quarter
None of the popular storage strategies—FC fabric, Big Iron, multi-tiered storage, or storage consolidation—has any intrinsic value, regardless of what a vendor may say.