Acquisition seen as consistent with Big Blue’s middleware-centric BI strategy
System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?
Forgetting to audit your local SAMs can prove disastrous
The new system is being promoted as an extensible platform capable of hosting for Windows Server 2003 Datacenter Edition, HP-UX, Linux, and even OpenVMS workloads
IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development
SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.
Grid computing finds enterprise killer apps
The time for application-centric storage performance monitoring is now
From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.
Enterprise ETL tools must address scalability, developmental, connectivity, and availability requirements
Windows XP security best practices, better SAML administration
Bottom line: IT can spend less time interacting with the business and more time dealing with strategic problems
Don’t let DumpSec fool you into a security comfort zone
New BI enhancements pass regulatory-compliance muster
Free instant messaging services are just one of the many security holes facing corporate IT
New approaches focus on stopping unsolicited e-mail before it's even received
Power5 and new AIX 5.3 bring multi-threading, enhanced virtualization to pSeries
NLayers' Insight creates application behavioral models to help organizations optimize and cut costs
CMS software enables end users and subject matter experts to keep Web content fresh and accurate
Our column on actual vs. real disk space touched quite a nerve