Enterprise


Does AON Pit Cisco Against IBM, SAP, and TIBCO?

AON takes Cisco further afield from its roots—and deeper into an EAI segment dominated by IBM, SAP, and TIBCO

Reader Feedback: Management's Web-Services Push Meets IT Resistance

Many IT pros remain skeptical about service-enablement, but—as a growing number are finding out—they don’t have a choice in the matter

The Devil Is In the Details

Is it true that the storage world is upside down in the southern hemisphere, too?

In Brief

Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles

CSO Worries High, Actions Lax

CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it

Denetworking, Anyone?

Reducing computing systems’ exposure to attack may be the goal, but unhooking network connections—or “denetworking”—is rarely feasible. A network endpoint appliance may be the answer.

Enterprises Struggle with Identity Management Roles

Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.



Integrating Outsourced Projects

Integrating teams is the key to outsourcing success

CA Takes Measured Workload Pricing into VSE Territory

CA last week announced a sub-capacity pricing initiative for VSE that helps bring that platform up to speed with its flashier sibling z/OS

IBM’s Data-Integration Strategy Takes Shape

With canned ETL already on tap from Microsoft and Oracle, what—if anything—does IBM have planned for DB2?

Outsourcing: IBM May be Planning Large Expansion in India

Big Blue might have plans to hire at least 14,000 additional workers this year—in India

The Big Gulp Theory

Who does the second-guessing is not always who pays the piper.

In Brief

Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam

Q&A: How to Get and Keep a Security Job

Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.

Guarding Against Esoteric Security Leaks

Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.

Design as a Signature Skill for the Knowledge Economy

The knowledge economy makes all of us designers every day. We need to become more adept at inventing and crafting new solutions to new problems.

Careers: IT Staff in "Legacy" Environments Sitting Pretty

Organizations are having second thoughts about the offshore outsourcing craze

SOA: A Reality Check from IT Pros

Up to now, service enablement has largely been the baby of C-level executives and line-of-business managers. Many IT professionals see the promise of the technology, but warn that the reality is several years away.

Five Tips for Transferring IT Staff to Service Providers

IT staff transferred to your service provider don't face a bright future

FilesX: New Tape Killer?

Disk-to-disk solutions are marketed as tape killers. We found one product that may actually live up to that claim.