Features & News


Wireless LAN Monitoring Reveals Risks and Risky Behavior

An activity-monitoring experiment in a confined, high-usage WLAN environment shows surprisingly few users take security precautions when accessing e-mail.

Briefs: Microsoft Flaw, nCircle Update

Microsoft warns of critical security flaw, nCircle updates IP360 vulnerability management

CA, SteelCloud Enter Crowded Appliance Market

Companies announce launch of antivirus, IDS boxes

Scalable Data Warehouses: Architects Must Improvise

Real-time requirements and faster performance are driving data warehousing changes. Inmon and Kimball provided a solid foundation, but large data warehouses may lead data architects into uncharged territory.

Q&A: Event-Driven Analytics

Informatica's co-founder and ex-president calls business activity monitoring a global positioning system for business health

Most Pervasive BI Tool Isn't What You Think

Vendors enhance support for Microsoft Excel as a BI front-end tool in their latest products

Case Study: Workflow Management

System Streamlines Proposal, Design Processes at Siemens



IBM's T-Rex Takes Off in Unexpected Locale

IBM's new z990 mainframe may be little-known in the US; the company announced its latest Linux-on-Mainframe "win" from overseas

Briefs: CA Unicenter Update, Microsoft's Palladium Misunderstood

Unicenter products now leverage extensions to CA's Common Services; Next Generation Secure Computing Base looks like a promising, user-controlled defense against privacy intrusions and security violat

EMC Bid Elates Legato Users

Users positive on acquisition, anticipate improved customer support

Fibre Channel's Dog Days of Summer

Debate heats up over Management Information Bases

Q&A: Scaling Reports Across the Enterprise

Cognos says ReportNet can support hundreds of thousands of users

Unsolicited E-mail Tops List of Intrusions

Spam edges out viruses; legal threat rises

Security Basics: New Data Security Laws Carry Greater Consequences

Go directly to jail, do not pass Go, and don’t even think about collecting your paycheck

Careers: Getting and Keeping an Information Security Job

Tips for starting out, furthering your information security career

CRM: Beg, Borrow, or Lease

Non-traditional acquisition methods will increasingly drive CRM adoption

Briefs: Business Objects, SAS, Pervasive

BusinessObjects delivers on enterprise performance management; SAS joins Liberty Alliance Project; full-text sub-second searches of Pervasive.SQL databases

Briefs: Bytware's Native iSeries Antivirus; Symantec Updates IDS Software

Bytware introduces native IBM iSeries virus detection; Symantec updates three intrusion detection system products

EMC Resurrects BMC Patrol

Companies plan to integrate Patrol and application-centric storage management capabilities in ControlCenter.

Data Governance: Managing Data for Profit

Good business decisions depend on the quality and accuracy of your data, which in turn depends on how you apply standards and controls—the process of data governance.