Enterprise


Office 12: What IT Needs to Know

Behind the flashy new graphical user interface and productivity enhancements is one big impact to IT. We spotlight three key benefits -- and one big expense -- any IT department should consider in its upgrade plans.

Getting to Success in Storage Management

Open-source initiatives may not be workable—or even enough. Consider treating disk as inventory instead.

Is SQL Server 2005 an Irresistible Proposition?

For perhaps the first time ever, SQL Server boosters are talking about taking on the other guys’ databases—and winning

Management's IT Experience Increases Company Performance, Study Shows

A new study makes a strong case for placing executives with IT experience at senior levels: a solid increase in a firm's economic performance.

Layering is Key to Countering Zero-Hour Attacks

Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.

Case Study: Outsourcing Threat Detection

With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring

Rise of the (Non-)Standard Block-Storage Protocols

Several changes today are opening the door once again to more novel and less standards-based storage protocols.



Troubleshooting Application Performance: IT Still Stuck in the Stone Age

Most organizations rely on resource-intensive and manual processes to identify and fix their application-performance woes

Q&A: Natural Disasters Drive Renewed Focus on Backup/Recovery Plans

Best practices for creating your disaster recovery plans

Why Physical Data Protection Isn't Enough

Logical data protection is a vital part of IT's backup/recovery plans

Virtual Patching Secures Web Applications

Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.

Careers: Application Development Skills Back in Demand

The enterprise application developer’s lot has long been an unenviable one—until now, that is

Data Archiving vs. Data Backup: A Closer Look

Savvy organizations are embracing data archiving as a means to reduce costs, improve performance, and satisfy compliance requirements

Three Keys to Successful Distributed Development

Software development from multiple locations is becoming a fact of IT life. Here are three tips for moving from traditional standalone methods to distributed development environments.

Oracle Database Passwords Vulnerable to Attack

Using a password hash, attackers can crack a database in about four minutes

Regulations Driving E-mail, IM Backup and Recovery

Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.

You Asked For It: HDS TagmaStore versus EMC DMX3

One-upmanship brings responsibilities to prove or dispel the boast.

Q&A: Monitoring What Web Applications Divulge

Watching inbound and outbound Web applications communications for signs of attack

IBM Offers New Take on Thin-Client Computing

IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too

Forensic Contingency Planning: Where to Start

A forensic readiness program helps a company protect its assets and know when they’ve been compromised.