Web 2.0 Seduces the Enterprise

Talk about disruptive technologies. Despite being widely available for only a few years, Web 2.0 tools, such as WYSIWYG blogging platforms, wikis, social networks, RSS and social bookmarking sites have had a tremendous impact on the way millions of people think about and use the Internet. The term “Web 2.0”

The Ins and Outs of SCM

Advocates of software configuration management tools and techniques tend to resort to metaphor when describing why, once adopted, IT organizations can’t live without them. By far the most frequent comparison is to the assembly line popularized by Henry Ford (but not invented by him, as it is widely believed). Before

Service-Oriented Architecture Promises Increased Flexibility

Wouldn’t it be a great idea if an enterprise’s IT resources could be linked and reused, enabling businesses to respond more quickly and cost-effectively to changing market conditions? That’s the theory behind service-oriented architecture (SOA) and, in theory, systems developed according to SOA principles promise new levels of flexibility. In

Secrets to Successful Software Integration

As a hosted electronic data exchange company, SPS Commerce in Minneapolis, Minn., is in the business of connecting the software it creates to applications its customers use every day. When the company recently outgrew some of its own systems, it was in a unique position of living its own customers’

Reinforcing WiFi Redundancy

Redundancy is routine in the constant scramble to keep a conventional enterprise network functioning. But the wireless infrastructure is often ignored, leaving enterprises vulnerable to malicious attacks and network failure. No longer a hot-spot sideshow, wireless is on track to become the primary enterprise network sooner than you might think.

Migration Without Mishap

Server migrations come in just about every size, shape and variety — you can change operating systems, hardware platforms, vendors or do any combination of the three. But whether you seek to increase capacity, upgrade to the latest technology or standardize on a particular hardware or software platform, the ability

Managing Mobile Devices

They are the best of tools and the worst of tools. Mobile computing devices can support the workforce out in the field or make your most sensitive company secrets public knowledge. The only way to simultaneously unleash your workforce and rein in company threats is to control the risks. Many

IT Survival Skills

For IT professionals, certifications in technical areas serve as standard career currency. But even the most gilt-edged diplomas may no longer guarantee advancement. To reach the upper levels of the IT organization, training time is better spent sharpening interpersonal and project management skills. According to an IT skills research survey

Is the Internet the New WAN?

After close to two decades — a lifetime in information technology — the traditional corporate wide-area network (WAN) may be headed for the endangered-species list. The usurper: Internet-based virtual private networks (VPNs). Instead of depending on dedicated leased or owned lines, VPNs use a variety of technologies to carry data

Is Real ILM Possible?

Managing data effectively has always been a major challenge for businesses. How do you capture it? Store it? Process it? Access it? What do you do with it once its immediate usefulness to your organization is gone? And, naturally, how do you accomplish all this at the lowest possible cost?