Big Blue is planning to share technical data needed to allow EMC to work with FlashCopy, Peer-to-Peer Remote Copy, and Extended Remote Copy functions.
AppAnalyzer 3.0 creates e-mail audits in line with new regulations
Big Blue takes hosting business to the next level
The moon may soon be home to your backup files
Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal
Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses
Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.
Move over, IBM—you've got company in lawsuits over disputed code
Company promises to deliver enterprises that can predict—and plan for—the future.
Version 6.5 of Notes and Domino adds built-in IM, plus better spam defenses, improved compression, and encrypted e-mail.
The best and most frequently cited advice gathered from nearly 2000 tech workers
Big Blue consolidates Host Access Transformation Server and Host Publisher, offering a more customer-friendly and intelligently packaged solution
Computer Associates' BrightStor team presents an impressive display of management applications
We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.
New worm targets old IE vulnerability.
IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.
Morgan Stanley says new computational grid delivers significant new performance in financial analytics.
Dominance of the Windows platform, coupled with its insecurity, can't be ignored any further, one security analyst warns.
Managing network changes has never been more critical. Here are ten functions a good network management system should provide.
Hewlett-Packard indemnifies customers against possible SCO lawsuits