Tardy SCO denied in bid to depose industry heavyweights Intel and Oracle
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.
One benefit of the hierarchical framework for grids introduced last week is that it helps us discover (and provides insight into) key constituencies in a grid ecosystem and its dynamics. Understanding these dynamics is fundamental to building a sound grid strategy.
Instead of embracing training as an investment in a savvy and innovative IT workforce, companies tend to view it as an encumbrance
After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.
IT is continually pressed to improve service levels while controlling the organization’s overall IT costs. A key driver to achieve this objective, and align IT with business priorities, is the utility computing strategy. We explore its benefits and how it can be applied to branch offices.
The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.
Size is NOT everything … it's all in how you manage your data.
To succeed with knowledge management, organizations should focus on getting better at reinventing the wheel instead of avoiding it.
Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.
We explore what grids are, their usefulness, and how they should be implemented and deployed.
Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications
No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm
Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems
Even companies that have embraced next-generation mainframe workloads often give short shrift to the question of training. What gives?
How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?
A great way to understand the power and benefits of grids is to look at the philosophy and two key properties they share with large transportation systems.
How you may be troubleshooting application performance and reliability issues in the loosely coupled application-scape of the future
Adding an imaging solution to your data-protection strategy can protect you from any type of data or server calamity.
Old-guard storage vendors believe storage management is the same as resource management. We explain why that concept is out of date.