Service-Oriented Architecture Steps into the Future

When USinternetworking, an application service provider (ASP) to more than 150 companies, was still very small, software architects and programmers were able to keep track of the available application codes and figure out how to make them work together. But as the Annapolis, Md. based company grew, the task rapidly

Social Network Security

Social networking sites are designed to let people reach out to one another. As virtual communities of professions and connections to experts, they can be valuable business resources. But these very interactions that make networking sites valuable are the same ones that can leave corporate networks vulnerable to IT security

SOA Is Looking A-OK

The clamor for convergence is reaching a deafening roar as IT departments seek new ways to make scarce budget dollars support broad and sweeping business changes. The more flexible and adaptable the technology, the better the play, the thinking goes. Better still: the technology becomes invisible, connecting multiple uses and

Seven Best Practices for Managing Data Storage

Despite the strategic value of data, many enterprises have yet to establish robust storage management strategies that keep important data readily available, the cost of managing it low and its access safe and secure. Given the huge proportion of corporate data that resides in unstructured or semi-structured form — such

Revise Your Technology Refresh Strategy

High on the list of certainties, right after death and taxes, is the knowledge that the computers your company bought just three months ago are already obsolete. But when is the best time to upgrade? When developing technology refresh strategies, enterprises are caught between the pull of new technology and

Is It Finally Time for the Grid?

Grid computing would seem to be a simple concept: computers are linked together and the machines share resources such as CPU cycles, RAM and data storage capabilities. Free resources on one machine can be tapped by other users on the grid; in return, a machine in need of additional computing

Are Remote Users Threatening Your Security?

The troubling news is remote access remains as much of a security threat for enterprise as it ever was. The good news is that companies can diminish the likelihood of a breach with the right management and technology. “Remote access is probably the key problem to all problems we have

The Pros and Cons of Server Consolidation

One of the hottest prospects to address the high administrative, support and infrastructure costs of the data center is server consolidation. “In the long term, server consolidation is something you absolutely must do,” says Tim Pacileo, executive consultant at Compass American Inc., a metrics-based IT consulting firm based in New

Outsource Your Data Center

Rapid change in technology is nothing new. But some things remain a constant: CIOs will always be under pressure to prove IT spending improves business growth and, at the same time, find ways to deliver more with less. These days, that means figuring out which parts of IT to keep

The New Virtues of Virtualization

After being sidelined for years by low-cost PCs and servers, the virtues of virtualization are re-emerging. Its adoption is accelerating among companies of all sizes. “The world will be virtualized in several years,” says Sal Capizzi, senior analyst at the Boston, Mass. based Yankee Group. “In five years, they’ll be