Enterprise


IBM and EMC Cooperate on Support and Fast Copy Utilities

Big Blue is planning to share technical data needed to allow EMC to work with FlashCopy, Peer-to-Peer Remote Copy, and Extended Remote Copy functions.

NetIQ Upgrades Exchange Monitoring Tools, Offers Web Monitoring

AppAnalyzer 3.0 creates e-mail audits in line with new regulations

IBM adds Windows, AIX, AS400 to Existing Linux Hosting Services

Big Blue takes hosting business to the next level

Lunar Backups—True Off-Site Storage?

The moon may soon be home to your backup files

Q&A: Securing the Door as Important as Securing the Data

Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal

Alerts: New IE Exploit Hacks DNS; Kaspersky Labs' Top Ten Viruses for September

Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses

Best Practices: Minimizing the Risk of Forgotten Modems

Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.



SCO Targets SGI in Linux Fight

Move over, IBM—you've got company in lawsuits over disputed code

Beyond Real Time: Tibco Aims for Predictive Business

Company promises to deliver enterprises that can predict—and plan for—the future.

IBM Brings Lotus Notes into Instant Messaging Era

Version 6.5 of Notes and Domino adds built-in IM, plus better spam defenses, improved compression, and encrypted e-mail.

Ten Tips for Potential Telecommuters

The best and most frequently cited advice gathered from nearly 2000 tech workers

IBM Modernizes, Consolidates Enterprise Modernization Tools

Big Blue consolidates Host Access Transformation Server and Host Publisher, offering a more customer-friendly and intelligently packaged solution

Catching Up With CA

Computer Associates' BrightStor team presents an impressive display of management applications

Coping with the Gramm-Leach-Bliley Act

We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.

Alert: Virus Masquerades as Microsoft Security Update

New worm targets old IE vulnerability.

Security Spending Will Top All IT Investments

IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.

Big Blue Pushes New Grid Bundles, Customer Wins

Morgan Stanley says new computational grid delivers significant new performance in financial analytics.

Security Experts Warn Microsoft's Pervasiveness Puts Companies At Risk

Dominance of the Windows platform, coupled with its insecurity, can't be ignored any further, one security analyst warns.

Top Ten Mission-Critical Network Management System Functions

Managing network changes has never been more critical. Here are ten functions a good network management system should provide.

HP Indemnifies Customers Against Linux Liability

Hewlett-Packard indemnifies customers against possible SCO lawsuits