Enterprise


Best Practices: Troubleshooting Web Services Performance on zSeries

Although there are performance problems associated with Web services technologies, companies have plenty of available options

Security Briefs: April Recap, Can-Spam Charges, Eset's Antivirus Software

Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise

Case Study: Mohegan Sun Bets on Virtual Password Vault

The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Security White Papers

White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail

SCO Finds April is a Cruel Month

Two companies move to have their lawsuits stayed or dismissed; venture capitalist firms asks for money back

Perspective: Six Challenges of Managing Mainframe Connectivity

From changing rules to technical complexity, a network manager's job is tough. We explore six challenges of managing mainframe connectivity in the first of a two-part series.



IBM Offers Public Preview of “Stinger” DB2

The next release of DB2 will make it easier for DBAs to deploy, configure, maintain, and optimize DB2 databases.

Big Blue Announces Power5, Virtualization Engine; Rechristens iSeries

IBM’s next-generation chip to debut in iSeries, the new name for the company's i5 line

Five Ways to Promote Your IT Department and Gain User Support

Many of the services provided by IT departments are taken for granted by the user community. This is not necessarily a bad thing. Like the power company an IT department is doing a good job when service is being provided so consistently it can be taken for granted. However unlike a power company, the IT department is also engaged in projects to improve the company’s profitability and competitive edge.

PSS Systems Provides Common Sense Data Management Policy Scheme

Recent legislation doesn't mandate changes to your storage infrastructure, but it does mean you'll have to manage your data more effectively.

Configuration Management Goes Mobile

New software fixes mobile computers that deviate from corporate standards

Cloaking Assets With Identity-Level Firewalls

New technology lets you hide and verify network identity inside the packets themselves.

American E-business Struggles with Global Fraud

Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent

Security Briefs: Two Protocol Vulnerabilities Disclosed

TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol

The Key to Optimal Outsourcing

Outsourcing can bring lower costs and increased levels of service, but be sure your Service Level Agreement is part of your contract.

Q&A: BMC on IBM's Candle Acquisition, Licensing Costs, and Cost of Ownership Issues

BMC's director of its MainView product discusses IBM's takeover of Candle, plus getting the best value from licensing

Enterprise Grid Alliance Premieres, Meets Resistance

Twenty industry members say alliance will encourage and accelerate the development of grid solutions for the data center through interoperability solutions

All Systems Go for IT Spending

International Data Corp. reports the first meaningful increase in IT spending since 2000—mostly in the western U.S.

IT Briefs: SAP Components, Manugistics’ Strategy Summit

Catalyst's visionary ComponentsNow marketplace for SAP users; Manugistics updates its progress on strategies announced at last year’s Envision conference, plus insight into company's view of its market