Enterprise


Determining the Value and ROI of an Enterprise Portal, Part 2

We examine how to value a portal investment, examining both the tangible and "soft" benefits of the technology. We'll also look at the buy-versus-build debate, and factors to consider in determining a portal's ROI.

In Brief

Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV

Rumors and Rumblings at SNW

Toigo sorts out fact from fiction

Does Open-Source Software Mean Better Security?

Setting the open-source security record straight

Best Practices: Patch Management

To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration

Defending Against Weak Authentication Protocols and Passwords

Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.

Careers: IT Salaries Expand…Slowly

Starting salaries will increase only modestly in 2005, although in-demand specialties should see much bigger increases



Big Blue Keeps Big Iron Out Front

If you're a mainframe booster, there have been plenty of reasons to smile lately. But the announcements aren't just for existing customers.

Determining the Value and ROI of an Enterprise Portal, Part 1

As the portal market becomes increasingly more competitive, the vendor choices grow to be even more complex. We discuss the value of an enterprise portal and methods for determining its return on investment.

IBM and BEA Court Enterprise Developers

Vendors tout new products and services designed to appeal to their bread-and-butter application server constituencies—enterprise developers

Why We Need a Data Management Summit

The thought of a vendor association dictating a schema for how companies should characterize their data is a frightening one.

Outsourcing Survey, Part 4: Contract and Human Costs

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the last two sections of our report, we look at contracts (size and duration) and explore the human costs of outsourcing.

In Brief

Blame unusable security, not users; Apple worm; high-speed IPS

Bias-Free Security Testing

New security-risk management tools bridge the security/business gap

Missing from SOX Compliance Efforts: IM Audits, Archives

With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.

Careers: IT Hiring Forecasts Still Too Close to Call

There’s little agreement about the prospectus for IT hiring—but there’s also little doubt that outsourcing is a hit

Testing the Waters: HP and SAP Launch Hosted ERP

The two partners will provide software, services, and support for less than $500 per user per month

IBM’s Mainframe Data Access Offering Is Moving on Up

Big Blue says its Classic Federation product boasts several advantages over existing mainframe data-access products

Alacritech: iSCSI’s Quiet Champion

The company's president and CEO helped create SCSI earlier in his career, and the company has since overcome some interesting technical challenges.

Outsourcing Survey, Part 3: What Gets Outsourced and Where It Goes

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the third article of our series, we look at what functions are outsourced. While application development is at the top of the list, we found a surprisingly large number of companies are outsourcing all IT functions.