Enterprise


In Brief

Antivirus and browser vulnerabilities, unsubscribe may be unwise

Google Desktop Search Tool Raises Security Concerns

Free hard-drive indexing utility raises corporate security and privacy questions

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

SOAs: Too Good to Be True?

The service-oriented architecture vision in practice may not be quite the slam dunk it looks like on paper

Outsourcing in Reverse: Foreign Companies Send Jobs to the United States

Not all outsourcing activity is a net loss for American workers

Tiered Access: iSCSI for the Enterprise, Part 2

When is iSCSI a more appropriate solution for your data center than fibre channel?

Q&A: Strategies for Automating Software Development

Programming automation gives developers more freedom to do their jobs



Scary Storage

Fall Storage Networking World at exactly the right time, on the eve of Halloween, since it is where you can go to watch the industry eat its young. Big players often use the venue to announce that they are swallowing up smaller firms.

Outsourcing Survey, Part 2: More Than Cutting Costs

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the second article of our series we examine what's motivating our Outsourcing Survey respondents to move projects to other providers. Surprisingly, it's not just about cutting costs.

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike

In Brief

Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Auditing Security Baselines with Security Templates

There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.

SCO: If You Can’t Beat ‘Em, Join ‘Em

The embattled company plans a pro-SCO Web site to counter the success of Groklaw.net

Growing Your IT Budget with Communication

IT organizations can take steps to increase their standing with business leaders and grow their IT budgets—but how many are actually doing so?

Big Blue Introduces 64-way Systems

IBM says its new iSeries i595 and pSeries p595 systems are the largest and most powerful non-mainframe systems it has ever delivered

Tiered Access: iSCSI for the Enterprise, Part 1

iSCSI isn't just for small data centers. To understand how iSCSI fits in your data center, we look at the four important tiers of servers. (Part 1 of 2)

Outsourcing Survey, Part 1: Who and Where

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the first of our series, we examine who's outsourcing and where the projects are headed.

Breece Hill's Turnaround Kid

Breece Hill's CEO, Phil Pascarelli, uses common sense to develop and evaluate storage products. His company is a model of the way things should work.

Case Study: Credit Union Encrypts Data onto Secure USB Keys

How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment