Big Blue’s durable workhorse still has plenty of kick left in it. And customers, for that matter, are increasingly willing to deploy it in support of new workloads
Finally, after nearly six years, Avamar Technologies has received the third of the 22 patents it has applied for.
With more-secure browser alternatives now available, will IE go by the boards?
Many organizations skimp on maintaining health data centers, putting security at risk
As Microsoft preps its most ambitious business intelligence offering to date—SQL Server 2005—the good relations it enjoys with some long-time BI partners could be at risk
Is Cognos positioning itself to better tackle Business Objects on its own turf?
Group Policy settings control almost every aspect of a computer from a central location, but incorrect settings can cause serious problems for clients and servers within the domain. We explain how to avoid problems from these error-prone settings.
In the age of SCO, patent suits are fraught with peril—especially for end users, who can find themselves simmering in the legal hot seat
2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs
How the thinking of a Jesuit priest can make a difference in IT/management communication.
Compuware’s Vantage Analyzer lets customers identify and isolate J2EE performance problems—including troublesome memory leaks
Oracle’s roadmap still leaves some questions unanswered—particularly for J.D. Edwards users. Company spokesmen reiterate support for existing users until at least 2013.
Chip giant Intel last week announced a reorganization of its business units, while HP announced new Itanium solutions and updated software for OpenVMS
Revivio’s Time Addressable Storage is an important technology that also happens to work.
Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations
It’s no silver bullet, but those who have used XI say the product goes a long way to addressing most of their concerns
With as much as 75 percent of corporate data still sitting on the mainframe, Big Iron is a platform few BI vendors can afford to ignore
How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely
There’s little risk for CRM vendors who wish to get into the social networking game—and the potential upside is enormous
What's hot in security spending this year