CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
How do you ensure that your encryption solutions effectively secure all your sensitive data?
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
Three updates are "critical"
The enterprise OS-scape could experience disruptive shocks during the next five years
IBM highlights enterprise, user-enabled application development Mashup Center
Aster Data Systems says new analytic platform can scale to handle large data volumes for analytic BI
What business users really want is self-serviceability, says Composite Software -- and that's just what Composite's new Discovery appliance gives them.
"What if we were to add a new product? What if we added 10 new salespeople? What if we built a plant in China?" Those sorts of complex business questions about the future call for business modeling.
Patient records compromised
Time to get compliant: industry watchers see XBRL adoption as a fait accompli
Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?
A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
Paying for word processing software may soon be a thing of past
VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.
If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?
How to determine that your “secure environment” has all the bases covered.
Why the threat of theft-from-within is keeping enterprise CIOs up at night
Four new features will help system administrators manage and test a company's Internet access security
Workaround involves disabling Symantec application before installing XP SP3