Enterprise


Meet the Other Linux Mainframe: Unisys' ES7000

Freshly certified for Linux, Unisys’ ES7000 supports mainframe-like features such as dynamic partitioning

My Bad: More on SNIA's Silence

Does it take money and membership in SNIA to get that organization to consider a good product?

In Brief

Samba Exploits, Dumping IE, and Securing iPaqs

Five Steps to Make Your Security More Proactive

While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.

Regulations, Productivity Spark Enterprise IM Adoption

Free and paid instant messaging use will rise dramatically in the next four years

Case Study: UCI Cinema Adopts SSL VPN for Anytime, Anywhere Access

With personal e-mail available in an instant from any connected PC via free Web-mail accounts, users want to know why their corporate e-mail, applications, and documents can’t behave the same way.

Seven Principles of Effective RFID Data Management (Part 1 of 2)

Instant decision-making on high-volume, high-velocity data streams isn't a new challenge. We examine seven principles to help manage RFID data.



Implementation SLAs: Should You Take the Bait?

SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk

CICS: Lynchpin of the Next-Gen Data Center

IBM releases two new and three updated CICS tools

Careers: Retaining Employees Back in Focus

CIOs talk up employee retention strategies; the return of travel, training, and table tennis

Adaptec and SNAP: Let the Joyous Wedding Begin

Adaptec and SNAP have found each other—and that bodes well for all of us

Linux Gets Host Application Security

New modules in the Linux 2.6 kernel make for easier host-based application security.

Locking Down Endpoints to Prevent Virus Resurgence

Verifying PC security compliance before granting network access

Briefs

IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities

Simplify Distributed Networks with Remote Office Optimization

To gain control of data and systems, IT consolidated their environment. A better solution is emerging: optimization tools.

IT Spending: Cost Reduction Still Key

How IT organizations are spending their budgets

Disaster Recovery: Balancing Performance and Availability

Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries

Court Rules Against SCO in DaimlerChrysler Suit

SCO’s day in court almost couldn’t have gone much worse; company says it's only a minor setback

Lock-Outs for Independents

Is there a role for the independent integrator in the well-demarcated world of storage vendor relationships?

Q&A: Eradicating Spyware in the Enterprise

Finally there's software to let enterprises remove spyware.