Enterprise


BMC Rebrands, Revamps Systems Management Tools

BMC’s new Performance Manager combines elements of Patrol classic and Patrol Express and features a single license.

A Three-Step Program for Improving Software Quality

Reliable, high-quality software can be yours if you incorporate these three principles into your development

The Truth About Tape Backup

Tape … disk … tape … disk! Round and round we go.

In Brief

Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index

Best Practices: Defending Against Insider Attacks

A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.

Severity of Spyware Attacks Escalates

Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.

India Shines in CA’s $1 Million Programming Challenge

CA put up $1 million in prizes to encourage developers to program for its open-source Ingres R/3 database



Why You Need a Personal Knowledge-Management Strategy

As a knowledge worker, follow a personal strategy for knowledge management, regardless of your organization’s knowledge-management practices.

IT Under Siege from Business Rules Management

BRM proponents want to do away with tasks many IT pros take for granted

Who Benefits from Outsourcing? Not the Line of Business

Some business customers are organizing “shadow” IT groups to replace IT resources that have been outsourced

Out-of-the-Box Thinking From Zetera

Despite the tens of millions of dollars spent by vendor marketing departments since the late 1990s to evangelize network storage, it has never happened. Until now.

In Brief

Prosecuting Spyware Makers, A New Endpoint Security Standard

Case Study: Continental Secures Remote Access, Trims Costs

Sometimes the drive for better security can also bring cost savings.

Q&A: Is Microsoft's Security Trustworthy?

Three years after Microsoft launched an initiative to improve its products’ security, we talk to information security veteran Gary Morse, president of Razorpoint Security Technologies, about the results.

IBM and Red Hat Partner for Big Iron Linux

Officials imply that the IFL bundle will be discounted—although no terms have been disclosed

Case Study: A More Resilient Application Infrastructure

Company taps on-demand delivery model to enhance retail management application

AMD Dual-Core Lead Leaves Intel Far Behind

AMD has forced Intel to abandon its decades-long marketing strategy, leaving the chip-making leader struggling to find its sea legs

eVault: A Secure, Managed-Storage Solution with Low Overhead

At least one company has been doing something right with its secure, managed-storage solution.

SANS Top Vulnerability List Gets Quarterly Updates

List helps prioritize vulnerability patching

In Brief

Sober.V Spreads, Apple Fixes 20 OS X Vulnerabilities, Mytob Tops Virus List