How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.
Direct-attached hard drives in servers are problematic. ISCSI SANs may be the solution.
Don’t expect to bring home a CRS-1 for less than a half million dollars
Sarbanes-Oxley compliance needn’t be a backbreaking ordeal
Most companies won’t make any changes to their IT staff levels, but those that do expect to add jobs, not cut them. Survey shows what skills are most in demand—and where the jobs are located.
Can smaller vendors still have a voice in an organization designed to develop hardware standards for the entire industry?
Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.
A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.
In the era of Do Not Call, predictive analytics can turn inbound calls—even complaints—into potential sales
Meanwhile, Microsoft builds bridges between Office and BI application vendors
DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files
Analytics functionality permeates PeopleSoft Enterprise CRM 8.9 release
Only distributed security can protect the borderless enterprise from today's threats.
Effective business continuity planning must address several different kinds of worst-case scenarios
Study says process changes and best practices are key, regardless of which ERP software you’re running
IT can eliminate costly upgrades and reduce installation problems by running hosted applications instead of licensing them. But there are pitfalls.
Service-oriented architecture starts with simple application integration and culminates with service choreography and next-gen “composite” applications
Analysis of the company's flagship event
Familiar problems are starting to crop up
The latest release of HyperRoll also includes algorithms to boost OLAP performance