Freshly certified for Linux, Unisys’ ES7000 supports mainframe-like features such as dynamic partitioning
Does it take money and membership in SNIA to get that organization to consider a good product?
Samba Exploits, Dumping IE, and Securing iPaqs
While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.
Free and paid instant messaging use will rise dramatically in the next four years
With personal e-mail available in an instant from any connected PC via free Web-mail accounts, users want to know why their corporate e-mail, applications, and documents can’t behave the same way.
Instant decision-making on high-volume, high-velocity data streams isn't a new challenge. We examine seven principles to help manage RFID data.
SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk
IBM releases two new and three updated CICS tools
CIOs talk up employee retention strategies; the return of travel, training, and table tennis
Adaptec and SNAP have found each other—and that bodes well for all of us
New modules in the Linux 2.6 kernel make for easier host-based application security.
Verifying PC security compliance before granting network access
IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities
To gain control of data and systems, IT consolidated their environment. A better solution is emerging: optimization tools.
How IT organizations are spending their budgets
Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries
SCO’s day in court almost couldn’t have gone much worse; company says it's only a minor setback
Is there a role for the independent integrator in the well-demarcated world of storage vendor relationships?
Finally there's software to let enterprises remove spyware.