Enterprise


SOAs: Defining the Integration and Orchestration of Services

Service-oriented architecture starts with simple application integration and culminates with service choreography and next-gen “composite” applications

Field Report: SAP SAPPHIRE: The Year of NetWeaver

Analysis of the company's flagship event

Pick a LUN, Any LUN

Familiar problems are starting to crop up

Case Study: Secure IM and Workspaces for Project Teams

Nektar Therapeutics security unites teams inside—and outside—the company

Security Companies to Congress: Listen Up

Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security

Security Briefs

Despite Arrest, Worm Exploits Continue; Microsoft Help Vulnerability Revealed; Symantec Firewall Management Improved

Q&A: Kicking the Tires of Mainframe Linux

The allure of Linux is strong, but unless ISVs rein in their software prices, Linux's growth on the mainframe could be limited



Why Tape Backup Is On The Way Out

Consider three technologies to replace the inefficiencies of tape backup

Networking, ERP: IT is Spending Again

Two down-on-their-luck technology sectors have been buoyed by economic recovery; other segments aren't quite so lucky

Flurry of IBM Announcements: Targeting MS Office, zSeries Development Tools, Storage Products

In just one week’s time, Big Blue takes aim at Microsoft Office, announces new COBOL and WebSphere integration tools for zSeries, and introduces storage products aimed at satisfying new compliance regulations

SMI: Will The Spec Ever Get Respect?

The SMI spec offers considerable benefits: improved efficiency and potentially huge management cost savings as well as improved troubleshooting capabilities. Yet SMI's poor outreach to end users has been a serious blunder. What the SMI should do next.

IBM's Mainframe Feature Set Trickles Down -- And Up

zSeries used to the be the source of features for other products in IBM's line. Now it may be the other way around.

Security Briefs: Worm Attacks Unpatched Computers; Apple Closes Vulnerability

Global organizations go offline to prevent Sasser damage; Apple patches QuickTime, OS X to close buffer overflow vulnerability

Dispelling Log Data Retention Myths

Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.

Survey: CEOs Crave Better Perimeter and Access Controls

Not knowing who’s accessing what is a recipe for auditing disasters

Perspective: Overcoming the Six Challenges of Managing Mainframe Connectivity

Last week we presented six key challenges network managers face. This week we explore how vendors are helping managers overcome these challenges.

Cisco SAN Switches Qualified for IBM Mainframes

Switches connect mainframe systems via IP-based SANs

Mono Project Brings Microsoft’s Insular .NET Technologies to Open Systems

Thanks to Mono 1.0, .NET is for Linux, Unix, and even MacOS

Winning the Little Battles to Demystify SMI-S

What, exactly, is SMI-S anyway? We may finally be able to find out.