One search engine is developing a solution that helps users secure their data from phishing attacks.
How IT managers can make themselves more strategic and create more value for their organization
The off-site storage industry continues to lack a common set of best practices to describe the services they provide or ways to measure service delivery.
More and more code jockeys are embracing software testing as a means to accelerate development and improve overall quality levels
To understand your corporate data and business rules, you need more than a metadata map.
Security remains a key reason some developers shy away from service-oriented architectures. IBM’s new release may help change that.
A defense contractor turns to admission controls to meet government requirements to secure national security information.
The worldwide market for IT services is booming—and the largest Indian services providers now threaten the market share of top global players
In the third of our four-part report, we look at compensation by company size, industry, and region.
Like a summertime guilty-pleasure-but-pointless novel, and SNIA’s latest document on information lifecycle management makes for nice beach reading.
Symantec survey focused on IT professionals’ views on vulnerability research and challenges they expect in the next year.
How one company learned if their outsourcing decision was the right one.
FileNet gives Big Blue best-of-breed technology, a huge installed base, and a steady stream of revenue.
Grid system complexity can tie an organization in knots in an endless debate trying to justify a deployment. The Hierarchical Usage Model Framework may help.
A financial advisory firm brings in an integration partner to help expand its financial systems
New study highlights commonalities between companies with the fewest IT compliance deficiencies.
Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives
An improving economy and more robust IT budgets are helping loosen the budget purse strings for key IT line staff positions but not for key management positions surveyed.
Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.
A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers