Mirror, mirror on the….drive. Is continuous data protection the next holy grail? We look at three approaches.
In spite of their differences, mainframers seem to agree on a few important points, although even these may surprise you.
It’s worth remembering how much the employment outlook has improved in the last half decade—and how far we have still to go
Last week, Oracle released a critical patch update for a SQL attack vulnerability that could give local attackers administrator-level privileges, and Apple patched Windows and Apple OS versions of QuickTime. Meanwhile a new report finds online attacks are hitting the bottom line.
In light of IBM’s purchase last year of Ascential, SAP and Oracle could be contemplating blockbuster data integration acquisitions of their own.
Many organizations have reached or exceeded their ability to support the growing security management headaches and are facing compromises. What we need is a complete suite of top-tier security technologies administered from a single, unified console. Is that even possible?
The best place to start improving knowledge work is at the end of the process: focus on ways to improve knowledge-work outputs.
Sifting through the options (and hype) of redundant-backup can be daunting. Our storage analyst simplifies things with three key questions.
It was a busy week for security alerts: more WMF flaws were exposed and two critical Microsoft vulnerabilities were revealed. Meanwhile, a review of 2005 IM threats gives a hint at what to expect this year.
With information security increasingly a boardroom-level concern, job prospects continue to be good, according to a new study. Training and certification are becoming increasingly important for candidates and companies alike.
What can we expect from IBM’s zSeries team in 2006? If history is any indication, it could be an eventful year.
Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property
With so many major events last year in the mainframe arena, why are so many Big Iron pros still pessimistic about the future?
In today’s compliance-crazy climate, data profiling is all but essential
How recent advances make SATA suitable for many enterprise online storage needs
How much noise will users have to make to get vendors to listen?
IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.
Security managers race to stem a mass outbreak
Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.
10, 9, 8……let's see what the future holds.