Enterprise


Taking Control of Data Center Automation

There’s an ugly downside to many of the utility computing technologies on the market today

Access Density: The Cause of Our Storage Woes?

While top administrators are spending money for things they don’t understand, IT professionals fail to see the value in overpriced goods.

Maximizing ITIL Standards: Choosing a CMDB Approach

With so much industry buzz around configuration management databases, why are so few actually in production?

An Rx for Mainframe Viability

If the mainframe is to remain a viable platform for the next forty years, IBM Corp. may need to do more to address some of its most glaring pain points

Case Study: Furthering Role-Based Access

Securing access in the post-mainframe world

How Data Security Breaches Hit the Bottom Line

A new survey reveals the best way to deal with breaches

TapeLabs: More than Just VTL

VTS: three new (and important) letters in the storage world



Careers: In-Demand IT Skills for 2006

Mainframe professionals need not despair: disaster recovery, system auditing, and enterprise application integration skills or experience are eagerly sought

Preventing Risky Password Practices

Users hate passwords, and it shows.

Top-Flight Companies Pay More, Expect More from IT Talent

World-class companies tend to pay almost one-third more for IT talent, but their turnover rates are also significantly higher.

Regulations Drive Whole-Disk Encryption

With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.

SOA: The Rewrite-vs.-Replace Dilemma

Legacy design approaches complicate things for would-be service-enablers and raise questions about the viability of some mainframe applications

Legacy Systems: Why History Matters

Do you understand the history that shapes the systems and technology in your organization and your industry?

When Standards Aren’t

Now you see it,now you don't. New products bear a startling resemblance to what you may already have.

Under-the-Radar Danger

How do you stop stealth endpoint malware not even your antivirus vendor knows about?

Careers: Big Iron's Catch-22

Are mainframe pros the victims of their platform’s strongest selling points?

On the Road Again: Multipathing and More

Products and technology uncovered in recent travels that piqued the interest of our storage commentator.

Is CMDB the Key to IT Service Management?

Looking to embrace configuration management database (CMDB) technology? We offer two best practices for defining your CMDB strategy.

Big Blue Gets Dashboard Fever

If vendor interest is any indication, dashboards are hot. In fact, they're positively sizzling, which may explain why IBM is jumping into the fray.

Bot Networks and Modular Code Target Enterprises

Increased attacks are driven by money and modularity.