It's not about how much IT spends. World-class companies know how to spend their IT budget wisely.
Imation Corporation survey shows IT infrastructure poorly safeguarded, despite recent natural and man-made events
Cisco details vulnerabilities in CiscoWorks; eMule code hiding in P2P software
Techniques for challenging and defeating spam filters continue to grow
To avoid the patch-and-pray cycle, IT organizations need to examine how to make vulnerabilities such as Sobig seem so small.
SmartDBA database management tool gets bi-directional data synchronization and replication capabilities.
Advocates say Oracle's bid is an attempt to acquire the customer base or destroy the company, but were excerpts taken out of context?
Just nine percent of CIOs say they plan to hire new IT professionals next quarter, while four percent expect further cuts.
StorageX answers a specific problem with a good solution. But how can the company cope with a niche solution that refuses to remain just a niche solution?
Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code
Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.
It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered
With Power5, IBM introduced Simultaneous Multithreading, in which each of the processors on the chip looks to the software like two processors. The technology offers 40 percent more performance.
Though SCO disclosed examples of copyrighted code in Linux, most users were unimpressed, and few say they'll change their plans—for now.
zSeries/SAP consolidation offers cost savings and performance potential that enterprises should consider, Sageza Group reports
IBM announced it will offer customers significant new incentives—including dramatically reduced software license costs and zSeries rebates—to move non-traditional mainframe applications
The author of a foundational white paper is struggling to figure out what the storage utility model really is.
Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely
Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.
New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing