Enterprise


Q&A: The Future of Notes and Domino

Is the Notes client on its way out? The latest on Notes, Domino, and products shown at Lotusphere, including Lotus Workplace Builder.

The Myth of Storage Grids

Storage vendors use "grid" as a sexy, futuristic-sounding metaphor, but grid storage has nothing whatsoever to do with grid computing.

First Worm Outbreak of the Year Packs a Wallop

MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door

Guarding Against Your Partner's Web Services Flaws

Coding errors in Web Services code at your partners can trigger problems on your own systems.

Product Shootout: Intrusion Prevention

Third-party testing firm analyzes leading IDS products, encounters surprises.

Briefs

New worm and Trojan software unleashed; purported PayPal mail carries worm

IBM's NT-to-Linux Migration Initiative, SuSE Certification Among LinuxWorld Highlights

Expectations were high, and attendees weren't disappointed



Careers: Offshore Outsourcing Hits U.S. IT Workers Hard

A new study shows that offshore outsourcing drives down U.S. IT wages; firm predicts up to 45 percent of full-time IT jobs could be outsourced by 2006

SCO Targets Novell in Latest Lawsuit

Novell arrives as a Linux leader in a big way

IBM Will Increase Employment Faster than Originally Planned

Big Blue says it will create 15,000 more jobs globally, of which 4500 net jobs will be in the United States.

The Human Dimension in Disaster Recovery

Your disaster recovery plan must consider more than just protecting and restoring your data. Your staff has to be recovered as well.

Reducing Unsolicited E-Mail: Making Senders Pay

Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.

Best Practices: Collecting Computer Forensic Evidence

Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.

Briefs

Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000

Battling Blended Threats with Pattern Detection

IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.

Serial ATA: Coming Soon to a Data Center Near You?

Industry watchers say that solutions based on the parallel ATA or Serial ATA standards are coming on strong, especially in disk-to-disk backup.

Simulation and Modeling: Beyond Fear and Loathing

Fifteen to twenty years ago, simulation was over-hyped. Today it's time to investigate the wide range of cost-effective, working solutions for business design needs.

SCO to IBM: I’ve Shown You Mine, Now Show Me Yours

SCO has at last turned over a list of files and code snippets it claims violate its intellectual property rights.

Why Systemic Storage Problems Remain Unsolved

Last year saw a dearth of real industry leadership, especially in storage technology, and a lot of posturing and posing. Why can't innovators with great ideas find venture capital?

Securing Mobile Workers

The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.