Acquisition seen as consistent with Big Blue’s middleware-centric BI strategy
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    System vulnerabilities can creep in through compressed files.  But does completely blocking their use make for good security policy?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Forgetting to audit your local SAMs can prove disastrous
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The new system is being promoted as an extensible platform capable of hosting for Windows Server 2003 Datacenter Edition, HP-UX, Linux, and even OpenVMS workloads
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Grid computing finds enterprise killer apps
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    The time for application-centric storage performance monitoring is now
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Enterprise ETL tools must address scalability, developmental, connectivity, and availability requirements
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Windows XP security best practices, better SAML administration
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Bottom line: IT can spend less time interacting with the business and more time dealing with strategic problems
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Don’t let DumpSec fool you into a security comfort zone
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New BI enhancements pass regulatory-compliance muster
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Free instant messaging services are just one of the many security holes facing corporate IT
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New approaches focus on stopping unsolicited e-mail before it's even received
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Power5 and new AIX 5.3 bring multi-threading, enhanced virtualization to pSeries
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    NLayers' Insight creates application behavioral models to help organizations optimize and cut costs
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CMS software enables end users and subject matter experts to keep Web content fresh and accurate
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Our column on actual vs. real disk space touched quite a nerve