Suddenly, you're faced with yet another intrusion, attack, abuse, virus or worm. Who should you call? What will you do immediately and long-term? Will your company even know it's been violated?
You could make the argument that living in Florida, we're among the nation's most "holiday challenged." The thermometer rarely dips below 78, and fireplace flues are rusted shut by saltwater-laden air. You could go broke trying to sell tire chains, snowboards or mittens here.
As you probably know, it's not a trivial task to use the Web to extend host system access to your employees. Furthermore, another challenge awaits in getting the same system out past the firewall to business partners. But suppose you also had to reach each and every employee within your partners' organizations?
Internet security is not just a network problem.
Justifications for business intelligence projects are as varied as business strategies and vendor product claims. Many are good, others not.
No matter how solid the disaster recovery plan your company had in place prior to Sept. 11, you've almost certainly revisited it since then. What will be disheartening is if, having done that, your company then decides that no further action is warranted. Might that happen?
If you listened to President Bush's address to Congress and the nation on Sept. 20, in which he first outlined the U.S.'s plan for reacting to the Sept. 11 attacks, you heard him mention <a href="http://www.libertyunites.org" target="_">>www.libertyunites.org</a>. Did you wonder to yourself who was behind an obviously sudden Web site that would shortly receive millions of hits and would have to immediately collect and make sense of huge amounts of data?
It used to be build, build, build, now it's fix, fix, fix
Still in its infancy, Sun ONE is Sun’s product strategy for building Web services using the Java platform. Of course, the big difference between the Java framework and the .NET framework is...
What will be the security challenges of the new Web services model? Your company will be most vulnerable where your Web services meet with the outside world's.
IBM Corp. used Comdex to share its plans with customers for the greater-than-eight-processor Intel architecture servers it will release next year
The second beta of the Universal Description, Discovery, and Integration registry went online today. The registry will offer an automated way to find and use available Web services.
Announcing a transition to open standards, SAP AG said yesterday its new MySAP products will support the J2EE Java specification. The company sees this as a step toward full support for Web Services and interoperability.
Enterprises have spent time and money to manage information assets on the back end, but the front-end – the side information workers see – sometimes goes neglected. To help enterprises quickly ramp up front-ends, last week, Microsoft Corp. introduced Data Analyzer.
As you've probably gathered from the plethora of hype and hope freely available from the vendor of your choice, Web services are the next distributed computing paradigm. [
We're trying to preserve vast amounts of digital data reliably for 100 years—but the storage media themselves haven't been proven to last that long.
Becoming a top-notch CIO: Start in the trenches of IT, spend some time learning on the business side and then meld
Managing a mainframe- or midrange-based data center often demands an ability to adapt to new requirements and innovations at the user level. That's why two companies in different industries recently set up a unique operational partnership that takes advantage of one another's resources.
This manager's guiding $6.9-billion deal with EDS to transform the U.S. Navy's view of e-business, including what might be the largest smart-card rollout ever.