An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing
Good, better, best? There's no answer in sight when it comes to file system virtualization.
For certain in-demand IT skill sets, premium pay has actually increased
In spite of IBM’s best efforts, a lot of customers continue to run mission-critical applications on older MVS mainframes
First, SMI-S, then Continuous Data Protection, and now ILM: SNIA’s on another meaningless standards-making jag
IBM hopes to double the number of participating institutions by the end of 2005
IT modernization projects help you deal with old application ghosts before they spook the bottom line. We examine project analysis and planning issues.
It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.
Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4
How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?
Two years on, Microsoft’s flagship offering still can’t hold a candle to VMWare. The question is when, if ever, will the software giant close the gap?
Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.
Knowledge workers perform craft work, and like any good craftsperson, you need a well-equipped workshop designed to meet the demands of your knowledge work.
When it comes to information lifecycle management, storage hardware vendors want to lock you in to their platform.
Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.
Some enthusiasts tout Eclipse as an Rx for programming anarchy
Mainframe emulation systems are often used in production settings, too—depending on the needs of customers
No, we're not in Kansas, anymore…..but where will European-based IT end up in the years to come?
More organizations are using fingerprints for logging onto PCs and into sensitive applications.
A financial firm faces regulations for monitoring and retaining IM communications.