Enterprise


Circling the Data

Active-Circle says it provides a centralized mechanism for establishing policy-based management across your existing network-attached infrastructure. We take a closer look.

Building Better Applications: Beyond Secure Coding

While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.

Regulations Spur Adoption of Network Access Control

Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.

Q&A: Straight Talk on Mainframe Futures

Seagull Software’s Andre Den Haan isn’t a knee-jerk contrarian—but he also isn’t afraid to call it as he sees it

Three Spring Projects for Storage Managers

Spring cleaning is a reminder to get busy with long-delayed projects, including several projects we ought to be initiating today to improve our storage infrastructure for the rest of the year.

Enterprise Grid Computing: Three Deployment Strategies (Last in a 7-part Series)

The advance of grid computing will bring in new capabilities, cut costs dramatically, enable increasingly ambitious projects, and offer more advanced capabilities to customers. While the implementation details are different for each industry, some strategies are common to all. We explore three strategies.

Enterprise Search: IT Faces the Google Phenomenon

Oracle enters the already-crowded enterprise search market, as IT moves to supply fast but secure search results.



Enterprise Grid Computing: Industry Verticals (Part 6 of 7)

We explore industry verticals that are are pioneers in grid adoption or illustrate significant, untapped benefits from grid adoption.

Managing the Data Archives Manager

Can MOM—a manager-of-managers for data archives—really make it all better?

Why Talent Once Again Matters

Organizations want to proactively identify and retain top employee performers before they can be identified and potentially wooed away by rivals.

Big Blue's z9-Centered Information Utopia

IBM's vision puts the mainframe in the center of a distributed application ecosystem that consumes data served up by zIIP workload engines

Fixes from Microsoft and Adobe, Havoc from McAfee

Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.

Q&A: IT in Denial over Spyware

While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.

Bot Networks Hurl More Trojan Code

Bot networks are behind the rise in malicious code aimed at capturing sensitive information. Also, IM attacks decrease during February.

Case Study: Patching the SAFE Federal Credit Union

The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.

Getting Started on Data Management

The only way to solve the seemingly intractable problems of storage management is to do so strategically.

Enterprise Grid Computing: Parallel Distributed Computing (Part 5 of 7)

A core capability of the grid is parallel distributed computation—scaling application performance beyond what is possible with one computer or grid “node.” Unfortunately, most applications today don’t take advantage of parallel computing.

The Mainframe Capacity Conundrum: Getting Better All the Time

What’s not to like about z/Linux and other cheap mainframe workloads?

Careers: CIOs Are Hiring Again

Fully 12 percent of CIOs expect to hire new IT workers in the upcoming quarter

Beware the Ides of March … and Storage Panaceas

None of the popular storage strategies—FC fabric, Big Iron, multi-tiered storage, or storage consolidation—has any intrinsic value, regardless of what a vendor may say.