Enterprise


Courtroom Showdown: SCO Denied

Tardy SCO denied in bid to depose industry heavyweights Intel and Oracle

Destroy, Shred, Disintegrate: Guidelines for Securely Decommissioning Storage

Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.

Enterprise Grid Computing: Usage Models (Part 4 of 7)

One benefit of the hierarchical framework for grids introduced last week is that it helps us discover (and provides insight into) key constituencies in a grid ecosystem and its dynamics. Understanding these dynamics is fundamental to building a sound grid strategy.

As the World Trains (Revisited)

Instead of embracing training as an investment in a savvy and innovative IT workforce, companies tend to view it as an encumbrance

Forty Million Stolen Identities Later: Learning from CardSystems' Breach

After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.

Extending Utility Computing Strategies into Branch Offices

IT is continually pressed to improve service levels while controlling the organization’s overall IT costs. A key driver to achieve this objective, and align IT with business priorities, is the utility computing strategy. We explore its benefits and how it can be applied to branch offices.

The Push for Federated Identity Management

The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.



Managing Storage, Part 2 of 2

Size is NOT everything … it's all in how you manage your data.

Get Better at Reinventing the Wheel

To succeed with knowledge management, organizations should focus on getting better at reinventing the wheel instead of avoiding it.

Business Process Success: Advice from an Expert

Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.

Enterprise Grids: A Framework (Part 3 of 7)

We explore what grids are, their usefulness, and how they should be implemented and deployed.

Do You Trust Your Storage to Mitigate Mobile-Device Threats?

Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications

SNA and the Hot New Network Security Paradigm

No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm

Microsoft, Lotus Patch “Highly Critical” Problems

Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems

Training: Commitment to IT Pros Still Low

Even companies that have embraced next-generation mainframe workloads often give short shrift to the question of training. What gives?

Q&A: Balancing E-Mail Security and Compliance

How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?

Enterprise Grid Computing: The Value of Resource Pooling—A Transportation Analogy (Part 2 of 7)

A great way to understand the power and benefits of grids is to look at the philosophy and two key properties they share with large transportation systems.

Splunk Touts Troubleshooting Rx

How you may be troubleshooting application performance and reliability issues in the loosely coupled application-scape of the future

Imaging: Simple Data Protection in a Complex IT World

Adding an imaging solution to your data-protection strategy can protect you from any type of data or server calamity.

Managing Storage: What's Missing (Part 1 of 2)

Old-guard storage vendors believe storage management is the same as resource management. We explain why that concept is out of date.