Enterprise


Networking, ERP: IT is Spending Again

Two down-on-their-luck technology sectors have been buoyed by economic recovery; other segments aren't quite so lucky

Flurry of IBM Announcements: Targeting MS Office, zSeries Development Tools, Storage Products

In just one week’s time, Big Blue takes aim at Microsoft Office, announces new COBOL and WebSphere integration tools for zSeries, and introduces storage products aimed at satisfying new compliance regulations

SMI: Will The Spec Ever Get Respect?

The SMI spec offers considerable benefits: improved efficiency and potentially huge management cost savings as well as improved troubleshooting capabilities. Yet SMI's poor outreach to end users has been a serious blunder. What the SMI should do next.

IBM's Mainframe Feature Set Trickles Down -- And Up

zSeries used to the be the source of features for other products in IBM's line. Now it may be the other way around.

Security Briefs: Worm Attacks Unpatched Computers; Apple Closes Vulnerability

Global organizations go offline to prevent Sasser damage; Apple patches QuickTime, OS X to close buffer overflow vulnerability

Dispelling Log Data Retention Myths

Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.

Survey: CEOs Crave Better Perimeter and Access Controls

Not knowing who’s accessing what is a recipe for auditing disasters



Perspective: Overcoming the Six Challenges of Managing Mainframe Connectivity

Last week we presented six key challenges network managers face. This week we explore how vendors are helping managers overcome these challenges.

Cisco SAN Switches Qualified for IBM Mainframes

Switches connect mainframe systems via IP-based SANs

Mono Project Brings Microsoft’s Insular .NET Technologies to Open Systems

Thanks to Mono 1.0, .NET is for Linux, Unix, and even MacOS

Winning the Little Battles to Demystify SMI-S

What, exactly, is SMI-S anyway? We may finally be able to find out.

Best Practices: Troubleshooting Web Services Performance on zSeries

Although there are performance problems associated with Web services technologies, companies have plenty of available options

Security Briefs: April Recap, Can-Spam Charges, Eset's Antivirus Software

Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise

Case Study: Mohegan Sun Bets on Virtual Password Vault

The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Security White Papers

White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail

SCO Finds April is a Cruel Month

Two companies move to have their lawsuits stayed or dismissed; venture capitalist firms asks for money back

Perspective: Six Challenges of Managing Mainframe Connectivity

From changing rules to technical complexity, a network manager's job is tough. We explore six challenges of managing mainframe connectivity in the first of a two-part series.

IBM Offers Public Preview of “Stinger” DB2

The next release of DB2 will make it easier for DBAs to deploy, configure, maintain, and optimize DB2 databases.