Enterprise


Storage Testing: Beyond Interoperability

Testing is absolutely required to ensure that storage “solutions” will actually resemble the pretty picture in the vendor brochure. But what's really needed is the ability to test storage products before you buy them—and under real workloads.

Security Briefs

New vulnerability erases hard drives; open source tool at risk; Oracle SQL exposure

Used Laptops Offer Secrets for Sale—Cheap

Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets

Q&A: Top Tips for Outsourcing Security

Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security

Improving Quality without Six Sigma

Here's one low-cost technique that's easily implemented and can substantially improve the quality of both systems and services.

World-Class Companies Spend Less on IT

World-class performance goes hand-in-hand with world-class restraint, at least where IT spending is concerned

Offshore Outsourcing Hits IT Pros Where It Hurts (Part 1 of 3)

Is the offshore trend driving down compensation levels across the IT industry?



Another Voice from the SMI-S Trenches

Was development of the SMI specification by the SNIA usurped by a small group of vendors? A developer provides his real-world experience.

Security Event Management: It Pays to be Proactive

To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.

Security Briefs

Hate sites and corporate liability; weak PDA data protection

Q&A: Stress Testing Your Network Against DoS Attacks

While most companies don’t face worms designed to turn computers against them, denial-of-service attacks remain a problem. How can organizations stress test their network against such attacks? We turned to Alan Newman of Spirent Communications, which manufacturers network stress-testing appliances and simulation software, for some ideas.

Business/IT Alignment: What CIOs Must Do

Is your IT organization battling its users instead of working with them? Here's what CIOs must do to improve IT/business communications.

Careers: Mixing Work with Vacation

For IT pros on vacation, work’s no more than a voice mail, e-mail, or SSH session away

Enterprise Information Integration Finally Arrives

IBM's Masala—its follow-up to DB2 Information Integrator—boats over 100 new features, including automation and data access improvements

SCO: Don’t Call It a Fishing Expedition

Company makes another bid for IBM’s AIX and Dynix source code

Storage Management: It’s All About the Price Tag

Customers say management features for heterogeneous storage should be a "given"—built-in (and free). Vendors say it's an add-on worth paying for. When will vendors wake up?

Case Study: Choosing Outside Help to Meet Security Regulations

Finding just the right provider can be tricky. How one company made its decision.

Protecting Customer Data at the Browser Level

Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.

Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.