Enterprise


Sprint Nextel Reverses Course on Outsourcing

GM, Dell, and Gap all notched mega outsourcing deals, but Sprint Nextel backed out of its own outsourcing accord with IBM

Crawling the Internet to Find and Stop Spyware

Researchers find spyware lives especially on adult, game, and wallpaper sites. The enterprise security mandate is clear: start blocking those sites.

Enterprise Grid Computing: Why the Buzz? (Part 1 of a 7-part Series)

Interest in grid computing has grown quickly. In this first part of a seven-part series, we begin an in-depth look at the technology by examining its popularity.

IM Security: E-mail’s Poor Cousin

Despite the popularity of instant messaging (IM), many organizations don’t regard the communications channel as an enterprise security risk.

IBM BladeCenter Changes Chip and Chassis

What do the PlayStation 3 and IBM’s next-generation blade system have in common? A single Cell, you might say.

Storage Security is Nothing New

Only by looking at data targets, then building security in pragmatic layers around the targets, can you realize strategic data security

Maximizing the Benefits of Capacity Planning

IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.



Corporate E-Mail Security: Compliance Swamps IT Staff

IT managers look to better tools, including self-service retrieval for employees

A Dirty Little Secret: The Industry and iSCSI

Disinformation in the iSCSI vs. Fibre Channel debates is stronger than ever

State of the Mainframe, Part II: The Capacity Conundrum

Some mainframe pros say that next-generation workloads (such as zLinux and J2EE) point the way to false destinies

Careers: Outsource-Proof Jobs

Some IT jobs are more outsourcing-resistant than others

Beyond Firewalls and IPS: Monitoring Network Behavior

Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.

Heterogeneous Snapshots Have Arrived

Will customers be able to establish real storage tiers and perform migrations of data per policy to enable 90 percent capacity allocation efficiency with a new arrival on the array horizon … and say goodbye to proprietary products?

Spinning Can-Spam

The FTC says federal anti-spam legislation is effective. Experts disagree.

The Shape of Endpoint Security to Come

Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.

A Few Bright Spots in Storage as 2006 Unfolds

As the first month of 2006 comes to a close, our curmudgeon of a storage analyst finds several companies deserve praise for their storage efforts.

Improving Network Productivity with Out-of-Band Technology

Once deployed as a safeguard to maintain network availability, out-of-band technologies now take center stage as the integrated out-of-band infrastructure boosts productivity across the main network. We explore the benefits of these technologies.

SOA’s Impact on SLAs: Trouble Ahead

Organizations may see service-enablement, and the next generation of SLAs, as a chance to improve the responsiveness and dynamism of their IT departments.

IBM Tweaks DB2 Workload Pricing

New processor could reduce the cost of exposing Big Iron DB2 to CRM, ERP, and other workloads

Computer Forensics: Still in the Stone Age

Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.