Features & News


Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

SOAs: Too Good to Be True?

The service-oriented architecture vision in practice may not be quite the slam dunk it looks like on paper

Outsourcing in Reverse: Foreign Companies Send Jobs to the United States

Not all outsourcing activity is a net loss for American workers

Tiered Access: iSCSI for the Enterprise, Part 2

When is iSCSI a more appropriate solution for your data center than fibre channel?

Q&A: Strategies for Automating Software Development

Programming automation gives developers more freedom to do their jobs

Scary Storage

Fall Storage Networking World at exactly the right time, on the eve of Halloween, since it is where you can go to watch the industry eat its young. Big players often use the venue to announce that they are swallowing up smaller firms.

Outsourcing Survey, Part 2: More Than Cutting Costs

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the second article of our series we examine what's motivating our Outsourcing Survey respondents to move projects to other providers. Surprisingly, it's not just about cutting costs.



Business Objects 11 Beta Features Back-End Integration

With competitors claiming that the Crystal acquisition has been a dud, Business Objects preps the next major release of its BI suite

Teradata Revamps DW for SOA, BI

Warehouse 8.0 boasts much of the plumbing that organizations will need to support service-oriented architectures

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike

In Brief

Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Auditing Security Baselines with Security Templates

There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.

DataBeacon Embraces .NET in Query/Analysis Solution

Company announces Smart Client, an end-user ad hoc query and analysis solution based on Microsoft’s .NET platform

SCO: If You Can’t Beat ‘Em, Join ‘Em

The embattled company plans a pro-SCO Web site to counter the success of Groklaw.net

Growing Your IT Budget with Communication

IT organizations can take steps to increase their standing with business leaders and grow their IT budgets—but how many are actually doing so?

Big Blue Introduces 64-way Systems

IBM says its new iSeries i595 and pSeries p595 systems are the largest and most powerful non-mainframe systems it has ever delivered

Tiered Access: iSCSI for the Enterprise, Part 1

iSCSI isn't just for small data centers. To understand how iSCSI fits in your data center, we look at the four important tiers of servers. (Part 1 of 2)

Outsourcing Survey, Part 1: Who and Where

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the first of our series, we examine who's outsourcing and where the projects are headed.

Breece Hill's Turnaround Kid

Breece Hill's CEO, Phil Pascarelli, uses common sense to develop and evaluate storage products. His company is a model of the way things should work.