Features & News


Improving Data Security with Key Management

How do you ensure that your encryption solutions effectively secure all your sensitive data?

CA Enhances, Expands Mainframe Management Suite

CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.

Three Steps to Web Application Safety

With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.

Microsoft Releases 7 Patches

Three updates are "critical"

Enterprise OS Segment Braces for Upheaval

The enterprise OS-scape could experience disruptive shocks during the next five years

IBM's Mashup Play

IBM highlights enterprise, user-enabled application development Mashup Center

Analytic Performance Key is the Network, Not the Database

Aster Data Systems says new analytic platform can scale to handle large data volumes for analytic BI



TDWI Audio Report: Modeling for the Business User

"What if we were to add a new product? What if we added 10 new salespeople? What if we built a plant in China?" Those sorts of complex business questions about the future call for business modeling.

P2P Breach Leads to Walter Reed Data Leak

Patient records compromised

Composite's Discovery Appliance Brings Self-Serviceability to End Users

What business users really want is self-serviceability, says Composite Software -- and that's just what Composite's new Discovery appliance gives them.

Mandatory Use of XBRL May Bring Benefits to BI Reporting

Time to get compliant: industry watchers see XBRL adoption as a fait accompli

HP Touts Blades Ready for Web 2.0 and Cloud Computing

Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?

Ensuring Successful Application Performance

If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?

Mainframe Reseller Market Consolidates

A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?

Threats to Office Multiply with New Offerings from Adobe, IBM

Paying for word processing software may soon be a thing of past

What Vulnerability Scanners Can’t Tell You

How to determine that your “secure environment” has all the bases covered.

Survey Says Insider Theft Tops CIO's Worry List

Why the threat of theft-from-within is keeping enterprise CIOs up at night

Sanity Check on Tape, VTL, and De-Duplication

VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.

ISA Server 2006 SP1 Planned for This Summer

Four new features will help system administrators manage and test a company's Internet access security

Symantec App Suspect in XP SP3 Registry Problem

Workaround involves disabling Symantec application before installing XP SP3