Executive Briefings


Who Benefits From Outsourcing?

A new report says CEOs do, and disproportionately at that

Best Practices: Windows File Server Consolidation (Part 2 of 2)

While Windows file server consolidation is seen as a top priority by most IT directors, such projects can be tricky to undertake. In the second part of our two-part discussion, we explore the best practices that will help you manage the risks and problems of such projects.

Best Practices: Windows File Server Consolidation (Part 1 of 2)

Consolidation is seen as a top priority by most IT directors, but understanding of storage consolidation as it relates to file servers is low. In the first in a two-part discussion, we explore the benefits and obstacles of server consolidation projects, and explore the impact on users.

CA, IBM Moving Databases Open Source

Computer Associates positions open source Ingres as a natural for Big Iron Linux; IBM's Cloudscape will become Apache's Derby

Seven Principles of Effective RFID Data Management (Part 2 of 2)

In the second article of our two-part series, we look at four additional principles to help you effectively manage your RFID data.

Meet the Other Linux Mainframe: Unisys' ES7000

Freshly certified for Linux, Unisys’ ES7000 supports mainframe-like features such as dynamic partitioning



Five Steps to Make Your Security More Proactive

While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.

Seven Principles of Effective RFID Data Management (Part 1 of 2)

Instant decision-making on high-volume, high-velocity data streams isn't a new challenge. We examine seven principles to help manage RFID data.

Implementation SLAs: Should You Take the Bait?

SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk

IT Spending: Cost Reduction Still Key

How IT organizations are spending their budgets

Disaster Recovery: Balancing Performance and Availability

Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries

IT Showing More Signs of Recovery

IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development

Why Traditional SLAs Are No Longer Adequate

SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.

Best Practices: Securing IM Against Attacks

Free instant messaging services are just one of the many security holes facing corporate IT

Managing the Strategic Desktop

Proactive desktop support has become an important corporate initiative. Here's why.

Lack of IT Guidance Hinders Compliance Efforts

Continued use of legacy environments may result in charges of negligence

Four Criteria for Evaluating a Security Vendor

When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

Q&A: Kicking the Tires of Mainframe Linux

The allure of Linux is strong, but unless ISVs rein in their software prices, Linux's growth on the mainframe could be limited