Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Metadata architecture is the lynchpin of the overall archive architecture. We explore three types of metadata: contextual, descriptive, and audit/control.
IBM’s move could drive down the cost of entry for many potential adopters—and stimulate additional sales for BladeCenter
The gap between top-performing and middling companies is widening. Could some organizations be left permanently behind?
A new report says CEOs do, and disproportionately at that
Is Network Appliance's grid storage campaign just marketing fluff?
Aeroplan adopts an XML firewall
Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities
Company offers outsourced wireless LAN to overcome security vulnerabilities
Short-term data loss isn't all you have to guard against
A cooler, more flexible, and more powerful Itanium design may yet succeed where brute force alone hasn’t been enough
Company’s technology will help extend the capabilities of IBM’s DB2 software for documents, images, digital media, and Web pages
Call-services specialist Rockwell tapped an outside QA specialist to nip potential application performance issues in the bud. It’s a growing trend.
Could the future of storage be in plastics?
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
Understanding what the security templates can provide could be invaluable.