To understand your corporate data and business rules, you need more than a metadata map.
Like a summertime guilty-pleasure-but-pointless novel, and SNIA’s latest document on information lifecycle management makes for nice beach reading.
With Intel finally righting itself after years of floundering in AMD’s wake, why did IBM pick now to take the Opteron plunge?
New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
Microsoft’s absence in new initiatives troubles industry watchers
In the first of our four-part report, we look at compensation growth for professional positions.
Mainsoft has great .NET to Java technology that is tapping a market in enterprises.
Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.
DataMirror last week trumpeted what it describes as “significant” performance improvements in the latest version of its Transformation Server for z/OS
Startup company draws on deep tradition and early products to establish name recognition and strong reputation.
Setting a storage usage policy can be tricky
If there’s an economic recovery afoot, IT budgets haven’t benefited
Rapid growth pushes software firm to a more mature development process
zLinux or Big Iron J2EE workloads perform better and are cheaper than their RISC- or Intel-based alternatives
How many new tricks can you teach an old pre-relational database? Plenty, especially if customers are still actively banking on it.
The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive
On-demand application suite offers big benefits for a small company
Facilitate coordinated change throughout your organization by establishing a comprehensive enterprise architecture (EA) program.
Before you realize the benefits of EA, you must communicate its value to the business so that it''s implemented properly.
Best practices to keep mobile and remote users safe