Enterprise


You've Been Left a Legacy—Now What? (Part 2 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We offer seven best practices for controlling and managing a project

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.

Sticking It Out on MVS

In spite of IBM’s best efforts, a lot of customers continue to run mission-critical applications on older MVS mainframes

Is Too Much Anti-Spyware a Bad Thing?

An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing

The New Security ROI

It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.

Oops—They’re Doing It Again

First, SMI-S, then Continuous Data Protection, and now ILM: SNIA’s on another meaningless standards-making jag

Microsoft and Apple Patch Operating Systems

Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4



IT Training: IBM Program Cultivates Talent in College Classrooms

IBM hopes to double the number of participating institutions by the end of 2005

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

You've Been Left a Legacy—Now What? (Part 1 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We examine project analysis and planning issues.

Microsoft's Virtualization Moves Still Lag

Two years on, Microsoft’s flagship offering still can’t hold a candle to VMWare. The question is when, if ever, will the software giant close the gap?

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

Building Your Knowledge Workshop

Knowledge workers perform craft work, and like any good craftsperson, you need a well-equipped workshop designed to meet the demands of your knowledge work.

When It Comes to ILM, Storage Vendors Want to Lock You In

When it comes to information lifecycle management, storage hardware vendors want to lock you in to their platform.

Q&A: Workarounds for Active Directory's Limitations

Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.

Eclipse: One IDE to Rule Them All

Some enthusiasts tout Eclipse as an Rx for programming anarchy

CA Brings Sub-Capacity Pricing to Low-MIPS, Emulated Mainframes

Mainframe emulation systems are often used in production settings, too—depending on the needs of customers

What's The Future for Storage in Europe?

No, we're not in Kansas, anymore…..but where will European-based IT end up in the years to come?

Case Study: Choosing Hosted Enterprise IM

A financial firm faces regulations for monitoring and retaining IM communications.

Q&A: Are Fingerprints the Next Smart Card?

More organizations are using fingerprints for logging onto PCs and into sensitive applications.