Enterprise


When Oracle Attacks: J.D. Edwards Shops Brace for the Worst

Many long-time J.D. Edwards users are bracing themselves for the worst while hoping for the best

Buckle Up for a Bumpy Ride in 2005

What are the key storage trends and where they may take us in 2005? Our storage expert, Jon Toigo, claims there's a lot of upside that may help offset the post-2004 malaise.

In Brief

Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin

Critics Blast Cybersecurity at Department of Homeland Security

When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?

Untangling Endpoint Security Initiatives

Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.

Offshore Outsourcing’s Pandora’s Box

Not all companies consider the risks—in terms of information security, data privacy, and potential legal liability—associated with offshore outsourcing

Desktop Linux Poised for Breakthrough

Novell sees a sizeable upside to Linux on the desktop—and hints that the sun might soon set on Microsoft’s Windows empire



Domino: Users Take Heart at Reports of New Versions

As IBM preps Notes/Domino version 7 for release later this year, it's clear that reports of product's death have been greatly exaggerated

This Year, Give the Gift of Biodegradable Storage

What can you do with dead or unneeded disk drives? Here are some suggestions.

HP Throttles Viruses, Cracks OpenView Identity

The latest security announcements from Hewlett-Packard

Ensuring Group Policy Security Settings Are Consistent

Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.

Top Ten Security Trends for 2005

What's in store for information security

In Brief

Charting spyware growth, identity theft at universities, safer Web browsing

Offshore Outsourcing Failures Boost Some IT Salaries

Networking, messaging, groupware, and applications development skills still in high demand

CA Revamps, Refocuses Unicenter Mainframe Line

CA touts ongoing initiative to modernize, simplify, and integrate its Unicenter mainframe software line

IT Spending Poised for Modest Rebound, Analysts Say

Managers laud expanding budgets, but say they’re under more pressure to cost-justify new projects and stretch IT dollars

Uber-SAN Switch? Don't You Believe It

Can a new switch from Brocade ready unite different SANs based on non-interoperable switches from different vendors?

New Enterprise Tools Attack Spyware

Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.

Case Study: Outsourced Network Security Uses Behavioral Modeling

The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising