Executive Briefings


CRM ROI: What’s in a (Customer) Name?

In today’s compliance-crazy climate, data profiling is all but essential

Beyond Malware, SOX, and Data Breaches: The 2006 Security Forecast

Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.

What Won’t Happen in Storage in 2006

10, 9, 8……let's see what the future holds.

The Enterprise Year in Review

From acquisitions to outsourcing, it was a very busy year

Changing Times at CA

Does grey knight CA—“the industry’s safety net”—have a new set of priorities?

Q&A: What Makes a Good Chief Information Security Officer?

To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.

Storage Products of the Year

Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.



Take IT from Bottom-Line Expense to Strategic Investment

How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?

Office 12: What IT Needs to Know

Behind the flashy new graphical user interface and productivity enhancements is one big impact to IT. We spotlight three key benefits -- and one big expense -- any IT department should consider in its upgrade plans.

Management's IT Experience Increases Company Performance, Study Shows

A new study makes a strong case for placing executives with IT experience at senior levels: a solid increase in a firm's economic performance.

Q&A: Natural Disasters Drive Renewed Focus on Backup/Recovery Plans

Best practices for creating your disaster recovery plans

Three Keys to Successful Distributed Development

Software development from multiple locations is becoming a fact of IT life. Here are three tips for moving from traditional standalone methods to distributed development environments.

Forensic Contingency Planning: Where to Start

A forensic readiness program helps a company protect its assets and know when they’ve been compromised.

Taking Control of Data Center Automation

There’s an ugly downside to many of the utility computing technologies on the market today

How Data Security Breaches Hit the Bottom Line

A new survey reveals the best way to deal with breaches

Preventing Risky Password Practices

Users hate passwords, and it shows.

Legacy Systems: Why History Matters

Do you understand the history that shapes the systems and technology in your organization and your industry?

Is CMDB the Key to IT Service Management?

Looking to embrace configuration management database (CMDB) technology? We offer two best practices for defining your CMDB strategy.

Big Blue Gets Dashboard Fever

If vendor interest is any indication, dashboards are hot. In fact, they're positively sizzling, which may explain why IBM is jumping into the fray.

Successful Project Management: Think Iteratively, Code Early

Is the way most enterprises develop software fundamentally flawed?