Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.
To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.
Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.
If you think you’ve got a lot more on your plate these days, you’re probably right
What really happened—and where does Firstlogic go from here?
With its better-than-spreadsheet-spreadsheet marketing strategy, Actuate could find an eager audience for its FPM tool.
Will BPM and ETL ride to mainstream success on the coattails of Microsoft’s SQL Server 2005 juggernaut?
Does IBM’s new master data management pitch take SAP, Oracle, and other enterprise applications vendors out of the loop?
How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?
Extra weight isn't just for the holidays. Here's a diet plan that might interest you.