Features & News


Mainframe Security: Good Enough for the 21st Century?

The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.

Commentary: Solving Internet Crime Needs International Approach

Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.

Q&A: ETL Dead and Done With?

Ascential Software says it has moved from an ETL provider to a data integration company. Will 2005 be the year of metadata?

Alerts: Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats in November

From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.

Business Objects Completes Crystal Acquisition

Company mum about the future

Q&A: Application Modernization Strategies

We spoke recently with Jim Rhyne, a distinguished engineer and eServer tools and enterprise modernization architect with IBM. Our discussion ranged from the scope of enterprise modernization (hint, companies often fail to adequately anticipate skills modernization), the phenomenon of mainframe brain drain (Rhyne isn’t convinced that there’s anything to it), application modernization strategies and, of course, the maturity of the Web services standards themselves.

DBMS Licensing Woes Turn Customers to Open Source Systems

Customers losing patience with negotiating database licenses are increasingly adopting open source DBMSes such as MySQL



Happy Days Are Here Again – Sort Of

Spending on storage and software should grow fastest next year. Among CIOs' top priorities next year: cost reduction, security, application integration, and Sarbanes-Oxley compliance.

Breaking the Next Storage Barrier

Worldwide disk storage systems sales could easily reach an exabyte by next year.

Ten Technology Predictions for 2004

Analysts from professional services firm Tallán explain the trends IT must manage next year.

Of File Systems and Databases, Part 2: Clustered File Systems

Clustered file system advocates have positioned their solutions as alternatives to the monolithic file systems (such as WAFL).

Business Objects/Kalido Partnership Tackles Data Quality

Is the information you’re funneling to business decision-makers accurate and reliable?

Q&A: Protecting Web Applications from Unknown Attacks

Companies must protect their data as well as their reputations.

Microsoft Reveals OLAP and Data Mining Features in Next SQL Server

Microsoft will support XML/A and claims to have simplified the MultiDimensional eXpressions language used by Analysis Services to define calculations and security rules, among other changes.

Security Budgets Will Rise Rapidly, Researchers Predict

Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also

Last Call for XQuery

Time if running out for comments on XQuery, meaning a unified standard for querying structured and unstructured data is getting closer to approval.

Alerts: Oracle Patch; Top Viruses for November; Yahoo Messenger Vulnerability

Oracle releases most, but not all patches, necessary to protect against SSL vulnerability. Kaspersky Labs reveals the top troublemakers in November. Yahoo's popular instant messaging program vulnerabilities.

Java and J2EE: Attracting Developers May Depend on the IDE

Tool providers recognize the lack of interoperability is a serious problem, but solutions vary greatly.

Careers: Fewer Companies to Offer Stock Options

New SEC rules among the reasons fewer companies will offer the benefit next year