Many IT pros remain skeptical about service-enablement, but—as a growing number are finding out—they don’t have a choice in the matter
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Is it true that the storage world is upside down in the southern hemisphere, too?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Reducing computing systems’ exposure to attack may be the goal, but unhooking network  connections—or “denetworking”—is rarely feasible.  A network endpoint appliance may be the answer.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cognos announces an ambitious partner program and gives customers a glimpse of its forthcoming Cognos 8 BI suite, now in beta
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations. 
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Executives are increasingly hip to the importance of business intelligence as an aid to decision-making
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IBM tries to keep current Ascential customers happy while satisfying the needs of new adopters attracted by the promise of its all-in-one data integration move
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Integrating teams is the key to outsourcing success
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CA last week announced a sub-capacity pricing initiative for VSE that helps bring that platform up to speed with its flashier sibling z/OS
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With canned ETL already on tap from Microsoft and Oracle, what—if anything—does IBM have planned for DB2?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Big Blue might have plans to hire at least 14,000 additional workers this year—in India
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Who does the second-guessing is not always who pays the piper.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Business Objects’ James Thomas dismisses Microsoft’s Reporting Services as just another in a line of Crystal “clones”
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If EII is indeed on the cusp of going mainstream, technology pure-play Ipedo is a name you might want to remember
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CSI plans to leverage its professional services expertise to address data quality shortcomings