What, exactly, is SMI-S anyway?  We may finally be able to find out.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Although there are performance problems associated with Web services technologies, companies have plenty of available options
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft may be setting its sights on business users with very little, if any, development expertise
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Predictive Model Markup Language gives applications a way to define statistical and data mining models and to share them with other PMML-compliant apps
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From advanced query performance to Cube Views, there's plenty for BI users to like in the "Stinger" release of IBM's DB2 database system
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Two companies move to have their lawsuits stayed or dismissed; venture capitalist firms asks for money back
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From changing rules to technical complexity, a network manager's job is tough.  We explore six challenges of managing mainframe connectivity in the first of a two-part series.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The next release of DB2 will make it easier for DBAs to deploy, configure, maintain, and optimize DB2 databases.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IBM’s next-generation chip to debut in iSeries, the new name for the company's i5 line
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Many of the services provided by IT departments are taken for granted by the user community.  This is not necessarily a bad thing.  Like the power company an IT department is doing a good job when service is being provided so consistently it can be taken for granted.  However unlike a power company, the IT department is also engaged in projects to improve the company’s profitability and competitive edge.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Recent legislation doesn't mandate changes to your storage infrastructure, but it does mean you'll have to manage your data more effectively.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New software fixes mobile computers that deviate from corporate standards
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New technology lets you hide and verify network identity inside the packets themselves.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New solution consolidates information from different sources—including financial applications and internal controls—into a single dashboard view.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol