After a quarter like System z just had, it’s difficult to see how or why competitors are still writing epitaphs for Big Iron
It’s all-but-official: electrical power consumption is a big issue today and will be an even bigger issue tomorrow.
Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.
In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.
Feedback on our column about clustering inefficiency.
Kalido is that rarest of extant creatures: a best-of-breed DW vendor. With a wrinkle or two, of course.
For some organizations, surprisingly, SQL Server 2005 has been a more or less turnkey migration experience—especially on the BI front.
Late last month, Big Blue gave pundits a glimpse at Power 6, the next-generation RISC CMOS it expects to unveil next year
Driven by regulations and internal compliance issues, searching and retrieving old e-mail stores is a challenge. Stronger search tools can help lessen the pain.
IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
While a growing number of organizations have gotten hip to the promise of PM, many are still in the PM iron age
As customer data integration rises, will data warehousing fall? Not so fast!