Testing is absolutely required to ensure that storage “solutions” will actually resemble the pretty picture in the vendor brochure. But what's really needed is the ability to test storage products before you buy them—and under real workloads.
New vulnerability erases hard drives; open source tool at risk; Oracle SQL exposure
Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets
Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security
Here's one low-cost technique that's easily implemented and can substantially improve the quality of both systems and services.
World-class performance goes hand-in-hand with world-class restraint, at least where IT spending is concerned
Is the offshore trend driving down compensation levels across the IT industry?
Was development of the SMI specification by the SNIA usurped by a small group of vendors? A developer provides his real-world experience.
To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.
Hate sites and corporate liability; weak PDA data protection
While most companies don’t face worms designed to turn computers against them, denial-of-service attacks remain a problem. How can organizations stress test their network against such attacks? We turned to Alan Newman of Spirent Communications, which manufacturers network stress-testing appliances and simulation software, for some ideas.
Is your IT organization battling its users instead of working with them? Here's what CIOs must do to improve IT/business communications.
For IT pros on vacation, work’s no more than a voice mail, e-mail, or SSH session away
IBM's Masala—its follow-up to DB2 Information Integrator—boats over 100 new features, including automation and data access improvements
Company makes another bid for IBM’s AIX and Dynix source code
Customers say management features for heterogeneous storage should be a "given"—built-in (and free). Vendors say it's an add-on worth paying for. When will vendors wake up?
Finding just the right provider can be tricky. How one company made its decision.
Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.
How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.