In the days before desktops, when IT was MIS and the words computer and mainframe were synonymous, non-MIS employees weren't supposed to understand, let alone attempt to learn about, anything digital. They weren't supposed to ask, and MIS wasn't supposed to tell.
Jim Craft is on a quest to secure information.
Firewalls are evolving to accommodate today's sprawling enterprise systems. Several types of products can enhance your security and peace of mind.
Make no mistake: Moving applications onto the Web merely makes disaster recovery planning even more critical.
How long will write-once-read-many (WORM) technology last? Up to now, this technology simply hasn't been around long enough to even take a stab at answering this question based on realtime testing. However, recently the maturity of optical WORM technology reached the point where it has finally become possible to test media that was written a considerable period of time in the past. The results indicate that TrueWORM media should have no difficulty lasting the 100 years or so that has been projected in the accelerated aging tests.
With the evolution of network management, more responsibility has been placed upon the "framework" to fulfill the TMN FCAPS model. Typical network operations centers, which support Simple Network Management Protocol (SNMP)-based logical and physical devices, must now be capable of supporting all business units in a uniform fashion.
Java development efforts are sweeping through the enterprise. Existing legacy applications are being reengineered to include Web front-ends. E-business is an idea whose time has come. This article introduces an Object-Oriented Project Size Estimation technique that can help predict the amount of time it takes to design, code and test an object-oriented project.
The creation of an information security policy can be a complex task. Decisions need to be made concerning the degree and type of security that is right for your company, while considering economic factors. Where do you begin?
With companies scrambling to gain yardage on the e-business playing field, data security and integrity could mean the difference between a win and a loss. Secure extranets redefine security from a defensive measure to a strategic, offensive move which allows companies to truly enable their online businesses.
Companies turn to Schumann Security Software's Security Administration Manager to build a repository of "who has access to what."
Today’s trend toward enterprisewide information sharing has network administrators scrambling to “build a better mousetrap.” This solution presents blueprints for building a seven-layer security system within your own network neighborhood.
The trend toward greater local and remote interconnectedness is driving the development of more sophisticated security and management solutions. Doing some home-work can really pay off when finding a security solution that falls under one easy-to-use, flexible management umbrella.