Baseline Issue May/June 2011

COVER STORY

Speeding To The Cloud
Baseline?s exclusive research reveals two key elements to a winning cloud implementation: attention to service-level agreements and a sharp focus on integration with the existing architecture.


VERTICAL VIEW

Seeking Healthy Solutions
Health care executives are building integrated technology platforms and sharing data in new, innovative and secure ways.


INNOVATION

Cyber-attacks Spur Innovative Security Approaches
Recent front-page data breaches are driving security professionals to find more innovative approaches to cyber-security.


FEATURE

Integrating Saas with Legacy Systems
IT executives are preparing for the challenges associated with integrating software as a service into their many legacy applications.

Cars.com Drives Performance
Cars.com offers its customers a streamlined yet comprehensive Website that has helped it accelerate past its competition.


JOB SITE

Dole uses IT to deliver ?fresh? information
Dole Fresh Fruit implemented a technology infrastructure that provides management with worldwide, real-time access to production and sales information on a common platform.


TECHKNOW

Choosing the Right Collaboration Tools
A growing number of enterprises are turning to collaboration tools to become more productive and competitive. These tools include wikis, Web and video conferencing, and smartphone applications.


GAMEPLAN

High-Performing IT Groups Beat Competitors

Fixing the Broken Business-Technology Link

A Guide to the IPv6 Transition

Back to the Mainframe

Regulatory Compliance Drives Encryption

Joint IT-Facilities Effort Cuts Energy Expenses


OUT OF SCOPE

Kill Your Computer
Stories report on people who ?kill? their PCs, a millimeter-scale computing system and the effects of being sleep-deprived.


OPINION

Starting Point by Eileen Feretic
There?s No Escaping the Cloud
Cloud computing is moving into the enterprise at a dizzying pace.

Perspectives by Gary Loveland
Who Is Accountable for Protecting Data?
The CEO needs to work with the CIO to secure the company?s perimeter.