GM, Dell, and Gap all notched mega outsourcing deals, but Sprint Nextel backed out of its own outsourcing accord with IBM
Researchers find spyware lives especially on adult, game, and wallpaper sites. The enterprise security mandate is clear: start blocking those sites.
Interest in grid computing has grown quickly. In this first part of a seven-part series, we begin an in-depth look at the technology by examining its popularity.
Despite the popularity of instant messaging (IM), many organizations don’t regard the communications channel as an enterprise security risk.
What do the PlayStation 3 and IBM’s next-generation blade system have in common? A single Cell, you might say.
Only by looking at data targets, then building security in pragmatic layers around the targets, can you realize strategic data security
IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.
IT managers look to better tools, including self-service retrieval for employees
Disinformation in the iSCSI vs. Fibre Channel debates is stronger than ever
Some mainframe pros say that next-generation workloads (such as zLinux and J2EE) point the way to false destinies
Some IT jobs are more outsourcing-resistant than others
Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.
Will customers be able to establish real storage tiers and perform migrations of data per policy to enable 90 percent capacity allocation efficiency with a new arrival on the array horizon … and say goodbye to proprietary products?
The FTC says federal anti-spam legislation is effective. Experts disagree.
Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.
As the first month of 2006 comes to a close, our curmudgeon of a storage analyst finds several companies deserve praise for their storage efforts.
Once deployed as a safeguard to maintain network availability, out-of-band technologies now take center stage as the integrated out-of-band infrastructure boosts productivity across the main network. We explore the benefits of these technologies.
Organizations may see service-enablement, and the next generation of SLAs, as a chance to improve the responsiveness and dynamism of their IT departments.
New processor could reduce the cost of exposing Big Iron DB2 to CRM, ERP, and other workloads
Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.