Enterprise


In Brief

Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks

Digital Certificates Get Pentagon, Regulatory Boost

Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Developing a Long-Term Archiving Architecture, Part II: Using Metadata to Store Data with Context

Metadata architecture is the lynchpin of the overall archive architecture. We explore three types of metadata: contextual, descriptive, and audit/control.

Big Blue Opens Up BladeCenter

IBM’s move could drive down the cost of entry for many potential adopters—and stimulate additional sales for BladeCenter

Rx for Corporate Performance: Spend Less on IT, Leave Competitors in the Dust

The gap between top-performing and middling companies is widening. Could some organizations be left permanently behind?

Who Benefits From Outsourcing?

A new report says CEOs do, and disproportionately at that



NetApp and Grid Storage: More Than Just Marketing?

Is Network Appliance's grid storage campaign just marketing fluff?

Security Briefs

Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities

Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Q&A: Itanium – Succeeding Where Brute Force Alone Isn’t Enough

A cooler, more flexible, and more powerful Itanium design may yet succeed where brute force alone hasn’t been enough

Big Blue Snaps Up Venetica for Unstructured Content Management

Company’s technology will help extend the capabilities of IBM’s DB2 software for documents, images, digital media, and Web pages

Case Study: A Fresh Perspective on Application Performance

Call-services specialist Rockwell tapped an outside QA specialist to nip potential application performance issues in the bud. It’s a growing trend.

My Dog Ate My (Storage) Home Work

Could the future of storage be in plastics?

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

Top Six Settings in Windows Security Templates

Understanding what the security templates can provide could be invaluable.