Enterprise


Copy-On-Write: The Next Evolution in Data Protection

Mirror, mirror on the….drive. Is continuous data protection the next holy grail? We look at three approaches.

State of the Mainframe (First in a Three-Part Series)

In spite of their differences, mainframers seem to agree on a few important points, although even these may surprise you.

Careers: IT Employment Rebounds

It’s worth remembering how much the employment outlook has improved in the last half decade—and how far we have still to go

Vulnerability Roundup

Last week, Oracle released a critical patch update for a SQL attack vulnerability that could give local attackers administrator-level privileges, and Apple patched Windows and Apple OS versions of QuickTime. Meanwhile a new report finds online attacks are hitting the bottom line.

Speculation Grows Over Acquisitions

In light of IBM’s purchase last year of Ascential, SAP and Oracle could be contemplating blockbuster data integration acquisitions of their own.

A Marriage of Convenience (and Security)

Many organizations have reached or exceeded their ability to support the growing security management headaches and are facing compromises. What we need is a complete suite of top-tier security technologies administered from a single, unified console. Is that even possible?

The Fundamental Secret to Improving Knowledge Work

The best place to start improving knowledge work is at the end of the process: focus on ways to improve knowledge-work outputs.



Simplifying Your Data Protection Strategy

Sifting through the options (and hype) of redundant-backup can be daunting. Our storage analyst simplifies things with three key questions.

Vulnerability Roundup

It was a busy week for security alerts: more WMF flaws were exposed and two critical Microsoft vulnerabilities were revealed. Meanwhile, a review of 2005 IM threats gives a hint at what to expect this year.

Careers: Strong Demand Continues for Information Security Jobs

With information security increasingly a boardroom-level concern, job prospects continue to be good, according to a new study. Training and certification are becoming increasingly important for candidates and companies alike.

zSeries: Big Plans Ahead?

What can we expect from IBM’s zSeries team in 2006? If history is any indication, it could be an eventful year.

Q&A: The 2006 Threat Landscape

Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property

Big Iron Pessimism Persists

With so many major events last year in the mainframe arena, why are so many Big Iron pros still pessimistic about the future?

CRM ROI: What’s in a (Customer) Name?

In today’s compliance-crazy climate, data profiling is all but essential

Why SATA is Enterprise Ready

How recent advances make SATA suitable for many enterprise online storage needs

Will This be the Year of Storage SOA?

How much noise will users have to make to get vendors to listen?

Maximizing the Benefits of Capacity Planning

IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.

WMF Flaw Provokes Headaches, Workarounds

Security managers race to stem a mass outbreak

Beyond Malware, SOX, and Data Breaches: The 2006 Security Forecast

Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.

What Won’t Happen in Storage in 2006

10, 9, 8……let's see what the future holds.