Behind the flashy new graphical user interface and productivity enhancements is one big impact to IT. We spotlight three key benefits -- and one big expense -- any IT department should consider in its upgrade plans.
Open-source initiatives may not be workable—or even enough. Consider treating disk as inventory instead.
For perhaps the first time ever, SQL Server boosters are talking about taking on the other guys’ databases—and winning
A new study makes a strong case for placing executives with IT experience at senior levels: a solid increase in a firm's economic performance.
Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.
With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring
Several changes today are opening the door once again to more novel and less standards-based storage protocols.
Most organizations rely on resource-intensive and manual processes to identify and fix their application-performance woes
Best practices for creating your disaster recovery plans
Logical data protection is a vital part of IT's backup/recovery plans
Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.
The enterprise application developer’s lot has long been an unenviable one—until now, that is
Savvy organizations are embracing data archiving as a means to reduce costs, improve performance, and satisfy compliance requirements
Software development from multiple locations is becoming a fact of IT life. Here are three tips for moving from traditional standalone methods to distributed development environments.
Using a password hash, attackers can crack a database in about four minutes
Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.
One-upmanship brings responsibilities to prove or dispel the boast.
Watching inbound and outbound Web applications communications for signs of attack
IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.