Many long-time J.D. Edwards users are bracing themselves for the worst while hoping for the best
What are the key storage trends and where they may take us in 2005? Our storage expert, Jon Toigo, claims there's a lot of upside that may help offset the post-2004 malaise.
Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.
Not all companies consider the risks—in terms of information security, data privacy, and potential legal liability—associated with offshore outsourcing
Novell sees a sizeable upside to Linux on the desktop—and hints that the sun might soon set on Microsoft’s Windows empire
As IBM preps Notes/Domino version 7 for release later this year, it's clear that reports of product's death have been greatly exaggerated
What can you do with dead or unneeded disk drives? Here are some suggestions.
The latest security announcements from Hewlett-Packard
Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Networking, messaging, groupware, and applications development skills still in high demand
CA touts ongoing initiative to modernize, simplify, and integrate its Unicenter mainframe software line
Managers laud expanding budgets, but say they’re under more pressure to cost-justify new projects and stretch IT dollars
Can a new switch from Brocade ready unite different SANs based on non-interoperable switches from different vendors?
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.
The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising