Features & News


IBM Snags AlphaBlox

Acquisition seen as consistent with Big Blue’s middleware-centric BI strategy

Case Study: Managing Zip Files with Security Controls

System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?

Top 10 Control Points For Your Local SAM

Forgetting to audit your local SAMs can prove disastrous

Q&A: HP – Recasting Windows as a Giant-Killer

The new system is being promoted as an extensible platform capable of hosting for Windows Server 2003 Datacenter Edition, HP-UX, Linux, and even OpenVMS workloads

IT Showing More Signs of Recovery

IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development

Why Traditional SLAs Are No Longer Adequate

SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.

Database, BI Solutions Drive Grid Growth in the Enterprise

Grid computing finds enterprise killer apps



You Had Me At I/O: A Love Story

The time for application-centric storage performance monitoring is now

A Busy Month for Attackers

From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.

Analyst: Few Products Meet Rigorous Enterprise ETL Requirements

Enterprise ETL tools must address scalability, developmental, connectivity, and availability requirements

In Brief

Windows XP security best practices, better SAML administration

Q&A: UDS—Informatica's Plug and Play Solution

Bottom line: IT can spend less time interacting with the business and more time dealing with strategic problems

DumpSec's Shortcomings Mask the Full Security Picture

Don’t let DumpSec fool you into a security comfort zone

BI Vendors Respond to Demand for Compliance Features

New BI enhancements pass regulatory-compliance muster

Best Practices: Securing IM Against Attacks

Free instant messaging services are just one of the many security holes facing corporate IT

IT Turns to SMTP-Level E-mail Blocking

New approaches focus on stopping unsolicited e-mail before it's even received

IBM Announces Power5 for pSeries

Power5 and new AIX 5.3 bring multi-threading, enhanced virtualization to pSeries

Agent-less Appliance Identifies Application Performance Problems

NLayers' Insight creates application behavioral models to help organizations optimize and cut costs

Content Management Systems Ease Web Updates for Non-Technical Users

CMS software enables end users and subject matter experts to keep Web content fresh and accurate

Readers Sound Off on T-Bits and B-Bits

Our column on actual vs. real disk space touched quite a nerve