Features & News


Web Attacks on the Rise; E-mail Attacks Decline

During the first three months of 2008, security researcher Sophos identified about 15,000 freshly infected Web pages every day

Bugs Are Up, Microsoft Security Report Says

Report, covering late 2007, found a 300 percent increase in Trojan bugs.

IBM's iDataPlex: Making Web 2.0 Safe for the Data Center

IBM touts its new iDataPlex Web 2.0 servers as nothing less than game-changing

Web Developers Left Holding the Bag on SQL Injection Attacks

Poor security practices are to blame, Microsoft says

Monitoring SOA and Application Performance

In the rush to adopt SOA, don’t forget SLAs.

Five Best Practices for Enhancing IT Development with Virtual Lab Automation

Software test and development labs play a key role in testing, validating, benchmarking, and evaluating new and emerging technologies.

What’s Really Driving Application Modernization?

IT shops don't always embrace application modernization as a means to ratchet up efficiencies. They're mostly looking to cut costs.



IDC: Consolidation Bringing IT Budgets Down in 2008

Information technology executives are focusing on cutting costs rather that investing in technology

Microsoft Nixes XP Extended-Life Rumors

Windows XP licensing for new PCs officially ends on June 30, despite comment by CEO Ballmer

TDWI Audio Report: Overcoming Obstacles to Pervasive BI

What are the barriers to making business intelligence truly pervasive in your organization? In this interview, Bob Abernethy of Strategy Companion discusses methods to help spread BI not only throughout your company, but beyond -- to partners, suppliers, and customers.

Metrics -- The Fuzziness Factor

How do you measure those hard-to-reach functions where bookkeepers don't go? Experts share their advice.

Best Practices in MDM: Cross-System Data Analysis

Cross-system data analysis is part of the critical path of any MDM project.

Brighthouse Data Warehouse Works Smarter to Accelerate Queries

Infobright says its Brighthouse data warehouse works "smarter, not harder" to accelerate query performance

Automation's the Name of the Game

Automation makes all the difference in a data center, which is why BMC, CA, HP, and IBM are spending heavily to get in on the action.

Analysis: Why Big Blue's Power Systems Consolidation Matters

One expert explains why last month's Power systems consolidation is so important.

How Identity Management Complements ERP

Enterprise resource planning (ERP) applications can automate business processes but do nothing to solve security problems. Identity management software, working in tandem with ERP, can help.

Oracle, Apple Issue Security Fixes

Microsoft isn't the only vendor issuing security "<em>mea culpa</em>"s lately. Oracle and Apple got into the action last week, too.

Backup and Recovery for Virtualized Environments

How to overcome challenges in protecting your virtualized environment

Virtual Servers and Storage: Truth or Dare

How many shops are really using server virtualization?

Council Publishes Guidelines for Securing Customer Data Online

Will address credit card and payment information