Outsourcing is suddenly fashionable again as business managers, confronting lean economic times, take another hard look at what is and isn't a "core competency."
The Jewish Home and Hospital of N.Y. uses an assortment of products from a variety of companies to manage its network.
Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?
Because an NXD (Native XML Database) changes the underlying unit of data from a row to a document, several other aspects of traditional databases need to be re-invented.
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
What's really happened to the security of information technology since Sept. 11?
Many of the seasoned veterans of the first generation of host integration are moving on to the next level—not only more tightly integrating their host platforms to the Web, but also linking into newer application environments from across their heterogeneous environments.
The Jewish Home and Hospital of N.Y. uses an assortment of products from a variety of companies to manage its network.
It's not always enough to assume that "the financial people" are keeping a close eye on things. As a project leader, you should be able to read between the lines of a company's financial report to spot potential problems.
Where once there was talk that the mainframe was dead, now the word most often seen in the same sentence with "mainframe" might be "resurgence."
Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.
Will .NET Framework bring Microsoft and true language-neutral development into the enterprise?
Experts tell us where you'll find the hotspots in enterprise technology through 2003.
A comprehensive list of computer forensic resources from Mat Schwartz, <i>Enterprise Systems'</i> security columnist.
A new kind of storage recently presented to me makes it important to understand the difference between server-attached, thin server-attached and switched server-attached storage.
The goal of CRM remains the same: To help companies get the maximum value from each customer relationship. But some areas, like Web-related CRM implementations, are still lagging.
Extending back-end mainframe and midrange systems out to the Internet now tops everyone's e-business to-do list.
Of all the financial information a company publishes, the two most important are the Balance Sheet and Income Statement, which I discussed last month. With these two documents in hand, what's next? Where do you start looking for the important information? How do you make sense of the data?
The City of Minneapolis turns to Unisys Corp. for its solution to update its infrastructure
Hold Brothers, a trading company, tracks down bandwidth usage to contain skyrocketing costs.
Never a company to be discounted on any front, Microsoft appears to be edging closer to its goal of being a serious contender for large, high-transaction enterprise systems.
Hold Brothers, a trading company, tracks down bandwidth usage to contain skyrocketing costs.
The City of Minneapolis turns to Unisys Corp. for its solution to updating its infrastructure.
A lthough they'd rather not relocate at all, IT workers are much more willing to move for a job today than they were 12 months ago.
Best way to prepare: Tell your R&D developers to focus on VoiceXML, but hedge your bets by giving them some background in SALT.
They say all politics is local, and that's certainly true for business. Nowhere is that more evident than in financial services, where customer relationships require strong personal bonds between representatives and their customers.
Sprint's new data mining system yields rich stores of customer information.
A new study by Techies.com, an online career and training cetner for technology professionals, compares average salaries for approximately 100,000 technology professionals in 38 U.S. job markets against the ACCRA's Cost of Living Index (COLI).
The old adage, "No one ever got fired for buying IBM (or EMC or Network Appliance)" still holds sway in most IT shops. That's in part because it's so difficult to answer basic questions about storage products.
In the battle for customers for single sign-on identity services, it appears to be Microsoft against everybody else.
Thinking about hiring a consultant, engaging a service provider or buying from a new supplier? Recommendations from satisfied friends and colleagues are important, of course, but for large expenditures your research should include a look at a company's financials.
IBM is now the last big-name builder of mainframes for the U.S. market, as Hitachi, Bull, Amdahl and others have dropped out.
Even before the economy sagged, data warehousing began to get a bad name because of exorbitant costs, lengthy implementation times and vendors promising far more than they could deliver.
Akamai uses massive parallelism to reach end users globally.
Though the two roles might seem to have very little in common, Lew Temares has been able to leverage his CIO experience and contacts to sharpen the engineering school's curriculum and, occasionally, add to its resources. Moreover, the dual role partly reflects his three decades of IT work in academic environments.
Akamai uses massive parallelism to reach end users globally.
Sprint's new data mining system yields rich stores of customer information.