A new report says CEOs do, and disproportionately at that
Short-term data loss isn't all you have to guard against
While Windows file server consolidation is seen as a top priority by most IT directors, such projects can be tricky to undertake. In the second part of our two-part discussion, we explore the best practices that will help you manage the risks and problems of such projects.
Consolidation is seen as a top priority by most IT directors, but understanding of storage consolidation as it relates to file servers is low. In the first in a two-part discussion, we explore the benefits and obstacles of server consolidation projects, and explore the impact on users.
Computer Associates positions open source Ingres as a natural for Big Iron Linux; IBM's Cloudscape will become Apache's Derby
In the second article of our two-part series, we look at four additional principles to help you effectively manage your RFID data.
Freshly certified for Linux, Unisys’ ES7000 supports mainframe-like features such as dynamic partitioning
While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.
Instant decision-making on high-volume, high-velocity data streams isn't a new challenge. We examine seven principles to help manage RFID data.
SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk
How IT organizations are spending their budgets
Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries
IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development
SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.
Free instant messaging services are just one of the many security holes facing corporate IT
Proactive desktop support has become an important corporate initiative. Here's why.
Continued use of legacy environments may result in charges of negligence
When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.
Only distributed security can protect the borderless enterprise from today's threats.
The allure of Linux is strong, but unless ISVs rein in their software prices, Linux's growth on the mainframe could be limited