Enterprise


Bridging the IT Cultural Divide, Part 2

How the thinking of a Jesuit priest can make a difference in IT/management communication.

Compuware Tool Tackles J2EE Application Performance, Availability Issues

Compuware’s Vantage Analyzer lets customers identify and isolate J2EE performance problems—including troublesome memory leaks

Oracle's Integration Strategy: It's All About "Fusion"

Oracle’s roadmap still leaves some questions unanswered—particularly for J.D. Edwards users. Company spokesmen reiterate support for existing users until at least 2013.

Intel, HP Shake Things Up

Chip giant Intel last week announced a reorganization of its business units, while HP announced new Itanium solutions and updated software for OpenVMS

Revivio's Point-in-Time Mirror Splitting Replacement: A Closer Look

Revivio’s Time Addressable Storage is an important technology that also happens to work.

In Brief

Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations

Case Study: Adopting Inverted Firewalls

How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely



Security Spending Trends for 2005

What's hot in security spending this year

Obsolete Software Draining IT Budgets

Almost all large organizations are paying for obsolete software that they’re not using, and some are paying a lot more than others, according to a new survey

Microsoft: Big Things in Store in 2005

An updated SQL Server ("Yukon") and Visual Studio, plus a new edition of Windows Server 2003 are among the highlights from the software giant

Bridging the IT Cultural Divide, Part 1

How the thinking of a Jesuit priest can make a difference in IT/management communication.

Careers: IT Salaries Fell, IT Budgets Rebounded in 2004

The mean of IT compensation declined by almost 1 percent in 2004 while inflation grew by more than 3 percent

Readers Sound Off: The Value of IT Education

Readers respond to our observations about degree programs in information technology.

In Brief

Continuing Internet Explorer vulnerabilities; FTC sweep for GLBA compliance snares two companies

Q&A: Open Source Network Vulnerability Scanners

Vulnerability management is no longer about maintaining perfectly patched machines.

Ten Group Policy Settings To Ensure Consistent Windows Security

Some of Windows' settings affect domain controllers, where others affect all computers. To ensure that your security foundation is properly established, use Group Policy objects to deploy and configure your security settings.

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.

Lowering TCO with Proactive Performance Management and Optimization

Four techniques enterprises can implement performance and optimization solutions that reduce TCO.

Big Year Ahead for Big Iron

Existing Big Iron shops should continue to add capacity at a healthy clip, and more and more OS/390 laggards will finally make the move to z/OS

Itanium Treading Water

Microsoft pulls processor support in some O/Ss