You’re supposed to dance with the one who brought you—it says here in small print.
Ten Microsoft Problems; Lotus Notes and Domino Vulnerabilities
Companies that better target their security spending actually spend less and have more effective security programs
A cybersecurity group works to improve security in the chemical industry.
The business rules approach is gaining ground—and has proven successful in the most unlikely of environments: long-time mainframe shops.
ILM is an emerging technology that promises to decrease the size and improve the performance of OLTP databases and data warehouses.
Analysts suggest that an IT spending slowdown is in the offing
Salaries, satisfaction, and training -- tell us where you fit
From "thin provisioning" to a report on the storage outlook in the small to medium-sized enterprise world, we look at the silly side of Spring.
Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption
Automated vulnerability remediation exists, but most companies still take a manual approach
What auditors and database administrators need to know
Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves
In search of a strategy that can improve knowledge work just as industrial work was improved in the last century.
Companies hope to blunt the momentum of storage appliance partners EMC and Dell
Despite unimpressive results, offshore outsourcing market is growing rapidly. Even so, plenty of offshore adopters could bring it all back home again
Microsoft has had some success in improving the image of its Windows Server 2003 operating system vis-à-vis Linux
New technology blooms in the Storage garden
What CFOs and CIOs need to know
Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data