How do you ensure that your encryption solutions effectively secure all your sensitive data?
CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
Three updates are "critical"
The enterprise OS-scape could experience disruptive shocks during the next five years
IBM highlights enterprise, user-enabled application development Mashup Center
Aster Data Systems says new analytic platform can scale to handle large data volumes for analytic BI
"What if we were to add a new product? What if we added 10 new salespeople? What if we built a plant in China?" Those sorts of complex business questions about the future call for business modeling.
Patient records compromised
What business users really want is self-serviceability, says Composite Software -- and that's just what Composite's new Discovery appliance gives them.
Time to get compliant: industry watchers see XBRL adoption as a fait accompli
Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?
If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?
A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
Paying for word processing software may soon be a thing of past
How to determine that your “secure environment” has all the bases covered.
Why the threat of theft-from-within is keeping enterprise CIOs up at night
VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.
Four new features will help system administrators manage and test a company's Internet access security
Workaround involves disabling Symantec application before installing XP SP3