Features & News


Security Briefs: Breaches Increase, Trojans Displace Worms

Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.

Five Tips for Securing VoIP

Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.

Backup/Recovery Strategies: Protecting Road Warriors (Part 1 of a 3-part Series)

IT must acknowledge the importance—and risks—of mobile computing tools and start building processes to protect corporate data.

Distributed Computing, Specialty Engines Bring Companies Back to the Mainframe

The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive

Unified Theories of Data Management

How do we manage the combined output of all of the event logs produced by all the available, and frequently used, management tools?

No DM Group Is an Island Unto Itself

Business intelligence practices—and the data management groups charged with overseeing them—are by no means independent of the enterprise IT main.

EII: The Prototype for a Killer App?

Some folks tout an intriguing, if esoteric, use case for EII: as a tool to help prototype the design or expansion of a data warehouse.



Users Laud Microsoft’s Business Intelligence Push

It might spell doom and gloom for vendors, but many BI pros think Microsoft’s BI push is good news for Microsoft-centric BI shops

An Appliance by Any Other Name…

A few weeks ago, Big Blue announced a new commodity data warehouse appliance based on 64-bit Opteron chips from AMD.

MicroStrategy Bucks a Trend

MicroStrategy continues to go its own way in the fast-changing BI suite-scape.

Sometimes It’s Not a Storage Issue

Trying to reconcile the technologies and products offered by the storage industry with the actual problems confronting IT can seem like a thankless job.

Anti-Spyware Gets Rootkit Removal

New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?

Podcast: Protecting Mobile and Remote Users

Best practices to keep mobile and remote users safe

Survey Says Big Iron a Solid Bet for the Future

The mainframe is entrenched for the long haul, respondents say

Beyond Logs: Security Event Management Market Heads For Shakeout (Part 2 of 2)

Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.

Making the Business Case for Big Iron

A growing number of mainframe pros are trying to educate their colleagues and C-level executives about the business case for Big Iron.

Tool-and-Die Makers in a Knowledge Economy

The full potential of tools to support knowledge work remains unrealized

Reducing Complexity in the Enterprise Data Center

Businesses need to be agile. An interconnect-driven server architecture may help. Here’s how.

Bad Day at the Races: Oracle Watches SAP Take First for CRM

Oracle’s $6 billion acquisition of Siebel was good enough for second place—behind arch-rival SAP—in 2005’s torrid CRM market.

Intuit Enhances QuickBase CRM-as-a-Service Entry

With more than one-third of the Fortune 100 tapping QuickBase for CRM, sales management and project management, Intuit thinks it has a winner on its hands.