Features & News


Alert: WPA Vulnerable to Dictionary Attack

Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.

SPSS Improves Its Business Analytics

Acquisition of DataDistilleries makes sense, as products are highly complementary.

Informatica Overhauls PowerCenter

Version 7 features new Web services-oriented architecture and supports for LDAP and CWM

Commentary: Computer Explosion Equals Virus Explosion

China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.

What’s in Store: Enterprise Reporting and Sarbanes-Oxley

One leading research firm says that enterprises need to actively investigate their reporting solutions and determine whether they comply with three key areas of Sarbanes-Oxley legislation.

Beyond Utility Computing: Gartner's Vision for Data Center Integration

Automation is the real key to real-time infrastructure, and today’s infrastructure is anything but real time. The solution: Gartner analysts tout a technology vision that centers on a dynamic, two-way relationship between IT and business processes. Gartner also identified three technology triggers required to achieve this new business process fusion.

Novell's Acquisition of Big Iron SuSE Leaves Users Cautiously Optimistic

Novell's track record with high-profile acquisitions is spotty, but users we spoke to believe IBM's $50 million investment in Novell is encouraging.



Careers: Health Care, Training Come First for IT Workers

Though 96 percent of techies say they want to work from home at least part time, (according to a techies.com survey), their top priorities are much different. IT workers are influenced much more by f

HP Uses Intel Itanium 2 Processor for Best-Ever Benchmark Results

In a seemingly endless series of leapfrogging announcements, HP reveals record-breaking server performance over IBM

Start-Up Challenges Blades with Low Cost Supercomputer

A new supercomputer with blistering performance of 60Teraflops running on standard Intel x86 processors?

IDC Puts Its Weight Behind Growing IT Recovery

Analyst firm says the waiting is over: IT spending is about to come back into line after two horrible years of IT budget declines.

IBM Announces Largest Mainframes Ever, Extends On/Off Capacity On Demand

With a raft of recent mainframe-related announcements, IBM Corp. is making a good case that Big Iron is far from dead.

Jaws 5: Quantum’s MAKO Library

MAKO is a slimmer, more elegant, and more capable implementation of their existing technology that combines several new architectural features that make it worth a look.

Top Twenty Virus List for October 2003

A newcomer dominates this month's list

Life After BI Acquisitions: Users Paint a Mixed Picture

Most users with whom we spoke say they will stay with their installed product, and they can’t imagine using anything else. Some, however, indicate that if they’re not satisfied with Business Objects’ service and support, they may tap Microsoft Corp.’s forthcoming SQL Server Reporting Services.

Case Study: Hurricane Stress Tests Firewall at Weather.com

The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.

Hyperion: Hitting Its Stride

With its acquisition of Brio complete, the company announces tentative product integration plans.

E.piphany Grows Customer Relationship Backbone

Suite's set of J2EE-based services supports customer-focused business processes, but the company's small user base may make it an attractive takeover target.

Alert: British Security Suffers; Apple Patches 14 Vulnerabilities

A new report from McAfee examines European companies' vulnerabilities.

Management's Holy Grail: Integrating Identity and Access Control

Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.