Enterprise


Supply Chain Software Vendors Forecast Recovery

ERP vendors, including Oracle and SAP, are transforming the supply chain software market

Finding the Recipe for Internet Success

A specialty baked goods company was losing online sales because of a Web site that couldn't handle peak holiday traffic. Solution: It upgraded its existing iSeries (AS/400) computers and created a new Web site running Linux.

Aberdeen Predicts Rise in IT Spending in 2003

Research group says runaway growth of the late ‘90’s won’t be reduplicated.

Spoofing Finds A New Angle

Network-based file caching may provide a means for real-time data sharing and disaster recovery in file systems according to storage start-up Tacit Networks.

Unisys Launches Global Security Consulting Practice

New security program takes broad-based look at corporate vulnerability.

Talking Integration With IBM

The success of Big Blue’s e-business on demand initiative is dependent on its bevy of integration offerings

Spoofing Finds A New Angle

Network-based file caching may provide a means for real-time data sharing and disaster recovery in file systems according to storage start-up Tacit Networks.



Candle Poised to Accelerate WebSphere Deployments

Candle’s PathWAI facilitates testing, deployment and management of WebSphere in complex application environments

Gateway Offers Grid Computing Power

Gateway’s new Processing on Demand service highlights the increasing visibility of grid computing technology.

The Two Towers of Storage Pain

As the year draws to a close, the “Two Towers” of pain in storage administration—capacity provisioning and backup—remain largely unsolved, despite considerable activity in the industry around these problems. Will vendor efforts yield blockbuster solutions in 2003 or are they just rearranging deck chairs on the Titanic?

Two Towers of Storage Pain

As the year draws to a close, the “Two Towers” of pain in storage administration—capacity provisioning and backup—remain largely unsolved, despite considerable activity in the industry.

Top 10 Junk E-mail Subjects of 2002

E-mail filtering provider reveals this year’s most popular unsolicited e-mail

RSA Targets WLAN Users with Token-Based Security Product

SecurID offering brings strong authentication to wireless networks

Novell’s Directory Services Strategy Focuses on UDDI Security

New directory server touts secure identity management for key Web services standard.

Sun Says Goodbye to Tough 2002, Expects Upbeat 2003

Unix leader to introduce new server blades, augment Solaris partitioning in 2003 and beyond.

Microsoft Certifies New High-End Datacenter Configuration

Enterprise Datacenter configuration promises reliability, scalability, and security for back-end datacenter environments.

IBM Introduces Linux on pSeries

Big Blue says customers can realize substantial cost savings over AIX

Unisys Touts Performance, Value of ES7000

Company says next revision of Windows Datacenter Edition will drive new ES7000 adoptions

Survey Reveals Holes in E-Mail and Internet Monitoring Strategy

Security Strategies highlights key elements of successful corporate monitoring programs

Identity Theft Case Underscores IT Security Flaw in Financial Services Sector

Security expert offers perspective on largest credit information theft case in history