Two down-on-their-luck technology sectors have been buoyed by economic recovery; other segments aren't quite so lucky
In just one week’s time, Big Blue takes aim at Microsoft Office, announces new COBOL and WebSphere integration tools for zSeries, and introduces storage products aimed at satisfying new compliance regulations
The SMI spec offers considerable benefits: improved efficiency and potentially huge management cost savings as well as improved troubleshooting capabilities. Yet SMI's poor outreach to end users has been a serious blunder. What the SMI should do next.
zSeries used to the be the source of features for other products in IBM's line. Now it may be the other way around.
Global organizations go offline to prevent Sasser damage; Apple patches QuickTime, OS X to close buffer overflow vulnerability
Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.
Not knowing who’s accessing what is a recipe for auditing disasters
Last week we presented six key challenges network managers face. This week we explore how vendors are helping managers overcome these challenges.
Switches connect mainframe systems via IP-based SANs
Thanks to Mono 1.0, .NET is for Linux, Unix, and even MacOS
What, exactly, is SMI-S anyway? We may finally be able to find out.
Although there are performance problems associated with Web services technologies, companies have plenty of available options
Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise
The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.
Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions
White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail
Two companies move to have their lawsuits stayed or dismissed; venture capitalist firms asks for money back
From changing rules to technical complexity, a network manager's job is tough. We explore six challenges of managing mainframe connectivity in the first of a two-part series.
The next release of DB2 will make it easier for DBAs to deploy, configure, maintain, and optimize DB2 databases.