Archives


E-Security: Growing Threats Require New Strategies

Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well.

SuSE Steps Up to Storage Management Plate

A new technology for Linux



Security

Just as explorers introduced disease to previously isolated populations, opening up corporate systems has added a slew of challenges. Although security policies were originally designed to keep unwanted intruders out, they now must also let the right people in, and do it as quickly and seamlessly as possible.

Don't Ask, Don't Tell

by Roberta Bragg

That Insecure Feeling

Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.

Taking a Second Look at CRM

Vendors, integrators and service providers still have much to learn from CRM systems. As the technology evolves, so should your appreciation of how it can affect the bottom line.

New Life for Old Software

The federal Jet Propulsion Laboratory is porting old VMS software onto new PC hardware running Linux, extending the life (and value) of legacy programs.

Don't Ask, Don't Tell

In the days before desktops, when IT was MIS and the words computer and mainframe were synonymous, non-MIS employees weren't supposed to understand, let alone attempt to learn about, anything digital. They weren't supposed to ask, and MIS wasn't supposed to tell.

Flirting with Disaster: How to Ensure Business Continuity

With the growth of distributed systems, companies aren't adequately planning for business continuity or disaster recovery across the enterprise. Is your firm guilty?

Revenge of the Dinosaurs

An <i>Enterprise Systems</i> columnist recently mentioned to me that in mid-June, largely unnoticed by the press, we passed the 50th anniversary of the Univac, generally regarded as the first commercial computer&#151;and the grand poobah of today’s technology-drenched culture.

Life as a Security Guru

Jim Craft is on a quest to secure information.

The Next Big Thing

If you'll be making a purchase or recommendation in the area of Web-to-host, you'll need to know what's shaken out with recent acquisitions—and where some of the major vendors are headed.

Beating a Bad Rap

Between the demise of dotcoms and the over-valuation of technology companies, it seems to me that mainstream IT has acquired a bad reputation. In my mind, there’s far too much generalizing going on these days.

Firewalls Fill the Gap

Firewalls are evolving to accommodate today's sprawling enterprise systems. Several types of products can enhance your security and peace of mind.

Keeping the Trains on Track

AS/400s help a Georgia railroad company keep track of where loaded trains are within the system.