In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices
SANs are out, virtual grids (aka storage clusters) are in.
There’s gold in the SMB market, and IBM officials say they’ve made real gains in the lucrative space
UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.
From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so
Why a nearline component solution is the most practical and cost-effective way to keep data warehouse storage costs under control.
More unstructured data and an emphasis on business intelligence will keep DBAs busy
DataFlux 8 features new project acceleration and geocoding enhancements, along with bread-and-butter data profiling improvements
BI systems can work magic for decision-support, but only if someone on the business side sponsors them!
It’s been a busy fortnight for Business Objects, which previewed its next-gen BI suite and touted its new sales and marketing alliance with IBM.
An increasing number of organizations are tapping full-fledged PM tools—including performance scorecards and dashboards.
Merging IT and physical security can bring some exciting synergies to an enterprise.