There’s more to virtualization than just getting the most from your server hardware.
Outsourcing megadeals appear to be on the decline; does this mean that outsourcing itself is on the way out?
A security researcher announces a new Threat Forecast service that aims to keep security chiefs at least one step ahead of the bad guys
If Green Software is to have an impact, the software industry as a whole needs to get onboard
These three steps can help you establish a "reality-based" risk mitigation plan
Rumors that Intel is not releasing the Universal Serial Bus 3.0 specification to its technology partners in a timely manner have prompted a rebuttal
Release candidate available via Windows Update
New products include readiness assessment tool and e-mail virtualization product
Platform now features extended support for VMware and Windows
Is the industry delivering tools that make it easier for mid-market customers to take the BI plunge? The answer: absolutely.
When BI vendors target small-and-medium-sized enterprise customers, the mid-market isn't the only segment that benefits
By following a four-step process, organizations can embark on an effective performance management journey that begins with reporting and adds more core BI capabilities for enterprise-wide integration.
How do you ensure that your encryption solutions effectively secure all your sensitive data?
CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
Three updates are "critical"
The enterprise OS-scape could experience disruptive shocks during the next five years
Company's E-mail Security SaaS product also gets an update
Version 5.0 of Active Administrator supports Windows Server 2008
IBM highlights enterprise, user-enabled application development Mashup Center