Enterprise


CICS Gets an Overhaul

Big Blue announces new offerings that retrofit CICS for new and emerging workloads—such as Web services and SOAs

Emerging Trends in Managing IT Service

Financial Services is an application-intensive industry uniquely reliant on end-user system availability.

Managing the Application Lifecycle to Reduce Risk and Trim Costs

Organizations embrace outsourcing without thinking about how they’re going to manage external applications and services

What PeopleSoft Users Should Do Now

While Oracle scores a TKO, PeopleSoft users face tough choices

An Open Letter To IBM

A note on the impact of iSCSI in the storage industry.

IT Budget Survey Results Released

From next year’s growing (or shrinking) budgets to hot spots for new investment, our survey shows how IT will be spending 2005’s funding.

In Brief

Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack



Case Study: Securing Network Bandwidth

A packet-shaping tool can help handle worm outbreaks.

Q&A: Can Wireless Networks Be Secured?

Denial is not a legitimate wireless strategy

Evaluating the Success of the Novell/SuSE Merger

Has Novell’s acquisition of SuSE been a success? Twelve months later, the jury is still out.

pSeries Grabs Performance Crown

A pSeries system anchored by IBM’s new Power5 processor obliterates the competition in a standard industry benchmark

IBM Pushes Power as an x86 Alternative

It might sound like a long shot, but a recent price/performance showdown between IBM’s Power system and an x86 server suggests otherwise

Optimizing Application Delivery in the Extended Enterprise

An application delivery platform suite can automate its end-to-end deployment

Data Lifecycle Management and the Mainframe Mindset

Without storage manageability, we can't effectively address storage costs, which take up to 60 cents of every storage hardware dollar. So why, in the distributed systems world, are we stuck without decent management tools?

Case Study: Finding and Fixing Security-Related Code Defects

Finding code problems was the challenge; a service provider's analysis held the answer

Microsoft and IBM Hone Security Warning Systems

Better security updates in the offing

In Brief

Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections

BMC Bets on a Big-Iron Future

BMC doesn’t think the reemergence of Big Iron is a fluke—and it’s putting its money where its mouth is

Itanium Dealt Setbacks by Microsoft, HP

Intel is abandoning the low-end 64-bit space to compete against RISC chips from IBM and other vendors in the high-end

PeopleSoft’s Fate Up to Shareholders

Oracle’s “best and final offer” has left PeopleSoft’s fate in the hands of stockholders.