Enterprise


Q&A: Moving to Web Services Identity Management

Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.

In Brief

Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market

How to Lower Security Compliance Costs

How organizations can get (and stay) compliant while spending less

Solid Infrastructure Paramount to Successful Outsourcing

Implementing a preventive methodology helps establish a solid infrastructure, raising the outsourcing organization's accountability, forcing them to write better code

Unisys Announces Capacity on Demand—For Intel Servers

Unisys, creator of the first Intel “mainframe,” announced a capacity-on-demand service for the x86 and IA-64 set

StorageTek Customers Pessimistic, Skeptical

Few users think Sun’s stewardship will be a good thing for StorageTek or its customers

Careers: Hiring Is Up But Salaries Are Flat

IT hiring activity looks to be on the rise, but IT compensation levels are stagnating.



ServerGraph to the Rescue

Backups do fail. ServerGraph provides a troubleshooting tool to track down and help you solve problems.

Caveat Browser: Mozilla Targeted

Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?

In Brief

Microsoft Updates XP WiFi Security, Worm Goes Right-Wing

Case Study: Energy Company Monitors IM

The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.

Windows Draws Even With Unix

For the first time, factory revenues for Unix and Windows servers were equal

IBM's New xSeries System Improves Performance, Validates Chipset Choice

IBM’s flagship xSeries server demonstrates how far Intel servers still have to go to reach feature and function parity

Sun Nabs StorageTek, Launches Image Makeover

For the first time in years, Sun looks like the cagey, competitive, and iconoclastic competitor of old

A New Frontier for Anytime Data: Data Integration on the Mainframe

New tools previously unavailable on mainframes can now enable native, simplified, cost-effective data integration with increased reliability, scalability and performance.

In Brief

CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs

Has Information Lifecycle Management Arrived?

Is enterprise content management the next new panacea?

Q&A: Sorting Out Desktop Protection Technologies

The differences between signature-based, access control, and intrusion prevention products

Few Organizations Increase Spending to Improve Security

While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.

Business Rules a Tough Sell to Veteran IT Pros

Some suggest that BRM is just a crazy notion in a technology utopia