Enterprise


Is Too Much Anti-Spyware a Bad Thing?

An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing

File System Virtualization: What War?

Good, better, best? There's no answer in sight when it comes to file system virtualization.

Salary Blues? Don’t Blame Outsourcing

For certain in-demand IT skill sets, premium pay has actually increased

Sticking It Out on MVS

In spite of IBM’s best efforts, a lot of customers continue to run mission-critical applications on older MVS mainframes

Oops—They’re Doing It Again

First, SMI-S, then Continuous Data Protection, and now ILM: SNIA’s on another meaningless standards-making jag

IT Training: IBM Program Cultivates Talent in College Classrooms

IBM hopes to double the number of participating institutions by the end of 2005

You've Been Left a Legacy—Now What? (Part 1 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We examine project analysis and planning issues.



The New Security ROI

It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.

Microsoft and Apple Patch Operating Systems

Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

Microsoft's Virtualization Moves Still Lag

Two years on, Microsoft’s flagship offering still can’t hold a candle to VMWare. The question is when, if ever, will the software giant close the gap?

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

Building Your Knowledge Workshop

Knowledge workers perform craft work, and like any good craftsperson, you need a well-equipped workshop designed to meet the demands of your knowledge work.

When It Comes to ILM, Storage Vendors Want to Lock You In

When it comes to information lifecycle management, storage hardware vendors want to lock you in to their platform.

Q&A: Workarounds for Active Directory's Limitations

Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.

Eclipse: One IDE to Rule Them All

Some enthusiasts tout Eclipse as an Rx for programming anarchy

CA Brings Sub-Capacity Pricing to Low-MIPS, Emulated Mainframes

Mainframe emulation systems are often used in production settings, too—depending on the needs of customers

What's The Future for Storage in Europe?

No, we're not in Kansas, anymore…..but where will European-based IT end up in the years to come?

Q&A: Are Fingerprints the Next Smart Card?

More organizations are using fingerprints for logging onto PCs and into sensitive applications.

Case Study: Choosing Hosted Enterprise IM

A financial firm faces regulations for monitoring and retaining IM communications.