Technology workers think employers don't do enough to ensure their personal safety (and that of their property) but will strongly resist any security measures that might infringe on their personal life.
What's really happened to the security of information technology since Sept. 11?
Many of the seasoned veterans of the first generation of host integration are moving on to the next level—not only more tightly integrating their host platforms to the Web, but also linking into newer application environments from across their heterogeneous environments.
It's not always enough to assume that "the financial people" are keeping a close eye on things. As a project leader, you should be able to read between the lines of a company's financial report to spot potential problems.
Outsourcing is suddenly fashionable again as business managers, confronting lean economic times, take another hard look at what is and isn't a "core competency."
A hardened operating systems brings security to the Bahá‘í International Community's Web site.
With constantly evolving standards and virtually every company's explosive growth in the size of its data, storage is more than a thorn, actually—it's a big nasty thicket of thorns.
Because an NXD (Native XML Database) changes the underlying unit of data from a row to a document, several other aspects of traditional databases need to be re-invented.
The Jewish Home and Hospital of N.Y. uses an assortment of products from a variety of companies to manage its network.
Where once there was talk that the mainframe was dead, now the word most often seen in the same sentence with "mainframe" might be "resurgence."
The City of Minneapolis turns to Unisys Corp. for its solution to update its infrastructure
A comprehensive list of computer forensic resources from Mat Schwartz, <i>Enterprise Systems'</i> security columnist.
Hold Brothers, a trading company, tracks down bandwidth usage to contain skyrocketing costs.
The goal of CRM remains the same: To help companies get the maximum value from each customer relationship. But some areas, like Web-related CRM implementations, are still lagging.
Hold Brothers, a trading company, tracks down bandwidth usage to contain skyrocketing costs.
The City of Minneapolis turns to Unisys Corp. for its solution to updating its infrastructure.
Extending back-end mainframe and midrange systems out to the Internet now tops everyone's e-business to-do list.
Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.
Of all the financial information a company publishes, the two most important are the Balance Sheet and Income Statement, which I discussed last month. With these two documents in hand, what's next? Where do you start looking for the important information? How do you make sense of the data?
Will .NET Framework bring Microsoft and true language-neutral development into the enterprise?
Experts tell us where you'll find the hotspots in enterprise technology through 2003.
A new kind of storage recently presented to me makes it important to understand the difference between server-attached, thin server-attached and switched server-attached storage.
Never a company to be discounted on any front, Microsoft appears to be edging closer to its goal of being a serious contender for large, high-transaction enterprise systems.
A lthough they'd rather not relocate at all, IT workers are much more willing to move for a job today than they were 12 months ago.
Best way to prepare: Tell your R&D developers to focus on VoiceXML, but hedge your bets by giving them some background in SALT.
They say all politics is local, and that's certainly true for business. Nowhere is that more evident than in financial services, where customer relationships require strong personal bonds between representatives and their customers.
Sprint's new data mining system yields rich stores of customer information.
A new study by Techies.com, an online career and training cetner for technology professionals, compares average salaries for approximately 100,000 technology professionals in 38 U.S. job markets against the ACCRA's Cost of Living Index (COLI).
The old adage, "No one ever got fired for buying IBM (or EMC or Network Appliance)" still holds sway in most IT shops. That's in part because it's so difficult to answer basic questions about storage products.
In the battle for customers for single sign-on identity services, it appears to be Microsoft against everybody else.
IBM is now the last big-name builder of mainframes for the U.S. market, as Hitachi, Bull, Amdahl and others have dropped out.
Thinking about hiring a consultant, engaging a service provider or buying from a new supplier? Recommendations from satisfied friends and colleagues are important, of course, but for large expenditures your research should include a look at a company's financials.
Even before the economy sagged, data warehousing began to get a bad name because of exorbitant costs, lengthy implementation times and vendors promising far more than they could deliver.
Akamai uses massive parallelism to reach end users globally.
Though the two roles might seem to have very little in common, Lew Temares has been able to leverage his CIO experience and contacts to sharpen the engineering school's curriculum and, occasionally, add to its resources. Moreover, the dual role partly reflects his three decades of IT work in academic environments.
Akamai uses massive parallelism to reach end users globally.
Sprint's new data mining system yields rich stores of customer information.