Enterprise


2004 Salary Survey, Part 3: IT Follows Bicoastal Economy

The Northeast and West Coast continue to lead in IT compensation

Microsoft Preps Windows Variant for High Performance Computing

There’s a new contender on the high-performance-computing block: Windows

Managing the Strategic Desktop

Proactive desktop support has become an important corporate initiative. Here's why.

Is Sun Microsystems on the Road to Recovery?

A major accord last month between Sun and Fujitsu could fundamentally shake up the high-end server space

It’s Not the Drill, It’s the Hole

Lousy component integration and ever-present infighting among Fibre Channel vendors may leave a hole in your wallet

Top Five Security Control Points Auditors Miss

Make sure you check these essential control points in any Windows network audit

Security Briefs

Active X Allows File Loading; Defining Spyware



Wireless Networks Continue to Bleed Data, Study Reveals

New study says 80 percent of companies have at least some unsecured wireless traffic

Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

2004 IT Salary Survey: Salaries Stagnant For IT Staff

Salaries and bonuses for IT pros have stabilized or are growing slightly. In one position, they actually declined.

Blade Servers: Big Iron in a Small Form Factor

Blade server success founded on key mainframe concepts

Offshore's Impact on Salaries, Certifications (Part 2 of 3)

Security, project management, and Linux skills are all still valuable

The Little Guy: Squeezed Out of SMI-S Land?

Can smaller vendors still have a voice in an organization designed to develop hardware standards for the entire industry?

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

SCO Identity Manager Supports Single Sign-on Across Environments

A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.

Security Briefs: WiFi Attacks, Outlook Vulnerability

DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

Q&A: Look Beyond Natural Disasters in Your Disaster Recovery Planning

Effective business continuity planning must address several different kinds of worst-case scenarios

ERP Vendor Choice Unimportant, Study Finds

Study says process changes and best practices are key, regardless of which ERP software you’re running

Pros and Cons: Software As A Service

IT can eliminate costly upgrades and reduce installation problems by running hosted applications instead of licensing them. But there are pitfalls.