Enterprise


Storage Provisioning with Blade Servers

Direct-attached hard drives in servers are problematic. ISCSI SANs may be the solution.

Cisco’s New CRS-1 Router Can Handle It All

Don’t expect to bring home a CRS-1 for less than a half million dollars

Q&A: Taking the Pain Out of Sarbanes-Oxley Compliance

Sarbanes-Oxley compliance needn’t be a backbreaking ordeal

Careers: Little Change Ahead in IT Staffing Levels

Most companies won’t make any changes to their IT staff levels, but those that do expect to add jobs, not cut them. Survey shows what skills are most in demand—and where the jobs are located.

The Little Guy: Squeezed Out of SMI-S Land?

Can smaller vendors still have a voice in an organization designed to develop hardware standards for the entire industry?

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

SCO Identity Manager Supports Single Sign-on Across Environments

A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.



Security Briefs: WiFi Attacks, Outlook Vulnerability

DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

Q&A: Look Beyond Natural Disasters in Your Disaster Recovery Planning

Effective business continuity planning must address several different kinds of worst-case scenarios

ERP Vendor Choice Unimportant, Study Finds

Study says process changes and best practices are key, regardless of which ERP software you’re running

Pros and Cons: Software As A Service

IT can eliminate costly upgrades and reduce installation problems by running hosted applications instead of licensing them. But there are pitfalls.

SOAs: Defining the Integration and Orchestration of Services

Service-oriented architecture starts with simple application integration and culminates with service choreography and next-gen “composite” applications

Field Report: SAP SAPPHIRE: The Year of NetWeaver

Analysis of the company's flagship event

Pick a LUN, Any LUN

Familiar problems are starting to crop up

Case Study: Secure IM and Workspaces for Project Teams

Nektar Therapeutics security unites teams inside—and outside—the company

Security Companies to Congress: Listen Up

Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security

Security Briefs

Despite Arrest, Worm Exploits Continue; Microsoft Help Vulnerability Revealed; Symantec Firewall Management Improved

Q&A: Kicking the Tires of Mainframe Linux

The allure of Linux is strong, but unless ISVs rein in their software prices, Linux's growth on the mainframe could be limited

Why Tape Backup Is On The Way Out

Consider three technologies to replace the inefficiencies of tape backup