Quantcast
Channel: Infrastructure Management - CA Technologies Blog
Browsing all 123 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Winning new friends and efficiencies through integration

Winning new friends and efficiencies through integrationDCIM offers a wealth of integration opportunities at a data, application and process level. Here's why it needs to be an evolution not a...

View Article


Image may be NSFW.
Clik here to view.

Is DCIM technology ready to be a game changer?

Is DCIM technology ready to be a game changer?Could the way DCIM changes your organization’s data center be the game changer you need to get ahead? After seeing a CNN headline on my mobile app that...

View Article


Image may be NSFW.
Clik here to view.

How security can be the key to your castle

How security can be the key to your castleIn the application economy does security help or hinder your business? Traditionally people view security like a castle moat. That is a great start but while a...

View Article

Image may be NSFW.
Clik here to view.

Avoiding the perils of point monitoring tools in the application economy

Avoiding the perils of point monitoring tools in the application economyAdopting a unified monitoring approach will help your business not only survive but thrive in the application economy.How many...

View Article

Image may be NSFW.
Clik here to view.

Are you geared up for the change brewing in the application economy?

Are you geared up for the change brewing in the application economy?Here are three key insights from IT administrators who stopped by CA Technologies coffee corner at SpiceWorld Austin.As you read this...

View Article


Image may be NSFW.
Clik here to view.

Get ahead of the game in the data center

Get ahead of the game in the data centerThe pedigree of a vendor and their data center solution can make or break a DCIM implementation. Here’s how to make sure you start with an ace. Watching a great...

View Article

Image may be NSFW.
Clik here to view.

How we’ve become ‘data hoarders’ and why we need a cleanup

How we’ve become ‘data hoarders’ and why we need a cleanupBut when we’re throwing away data, how do we determine what’s going to be valuable for analytics down the road?To understand how we’ve become...

View Article

Image may be NSFW.
Clik here to view.

Adapt your infrastructure for the demands of the application economy

Adapt your infrastructure for the demands of the application economy The survey results are in from CIOs attending last week’s Gartner Symposium in Orlando. Find out what they shared with us, because...

View Article


Image may be NSFW.
Clik here to view.

Better service reliability yields better customer experience

Better service reliability yields better customer experienceCustomer experience is the key to better IT business management.Traditional enterprise infrastructure management tends to focus on the...

View Article


Image may be NSFW.
Clik here to view.

Why you can bank on the mainframe in the application economy

Why you can bank on the mainframe in the application economyThe mainframe is the foundation for SaaS delivery, putting it at the forefront of our ever-increasing connected world of mobile apps and...

View Article

Image may be NSFW.
Clik here to view.

Do more with less hardware

Do more with less hardwareWhy overburden your data center with more than you need? Take control of your infrastructure and utilize the computing power you already have with the right tools and...

View Article

Image may be NSFW.
Clik here to view.

What not to miss at this year’s performance and capacity conference

What not to miss at this year’s performance and capacity conferenceWe’ve compiled a top 10 list of "don’t miss" things you need to attend if you want to get the most out of the conference and, of...

View Article

Image may be NSFW.
Clik here to view.

Combating cybercrime while protecting privacy

Combating cybercrime while protecting privacyCybercrime costs the world economy $445 billion every year – so what are organizations, vendors and governments doing about it?Imagine a headline screaming,...

View Article


Image may be NSFW.
Clik here to view.

What was Google’s original name?

What was Google’s original name?Changing a name doesn’t have to spell the end for a brand. That didn’t happen with Google and other household names. Why the words “name change” don’t have to instill...

View Article

Image may be NSFW.
Clik here to view.

Taking the next steps into the cloud

Taking the next steps into the cloudDigging deeper into cloud survey data with research firm Vanson Bourne.Cloud computing is maturing and organizations are gaining more experience with the platforms...

View Article


Image may be NSFW.
Clik here to view.

The Ugly Duckling or a powerful swan?

The Ugly Duckling or a powerful swan?The next generation of CIO's didn’t go to school with the mainframe but that shouldn’t keep them from learning its value in enterprise IT.In Ireland, instead of...

View Article

Image may be NSFW.
Clik here to view.

What Obama’s Executive Order means for the security industry

What Obama's Executive Order means for the security industryPresident Obama’s Executive Order puts into practice what the security industry and CA Technologies have been preaching for years.President...

View Article


Image may be NSFW.
Clik here to view.

Mobile analytics for the win in the application economy

Mobile analytics for the win in the application economy How customer demand is changing the future of cable companies and how the application economy is enabling a 24-7 service. A few weeks ago, John...

View Article

Image may be NSFW.
Clik here to view.

What Switzerland and vendor agnostic storage have in common

What Switzerland and vendor agnostic storage have in common If CA Technologies Cloud Storage for System z were a country, it would be Switzerland. What does a cloud storage solution have to do with...

View Article

Image may be NSFW.
Clik here to view.

What’s less discussed about President Obama’s Cyber Executive Order

What’s less discussed about President Obama’s Cyber Executive OrderFollowing on from the first blog post on Obama’s Executive Order, this post looks at the requirement for securing online transactions...

View Article
Browsing all 123 articles
Browse latest View live