Enterprise


The End of Disaster Recovery Planning

Disaster recovery planning must become an integral part of application development so the right middleware and coding choices are made at the outset of system design.

IBM's New zSeries Attracts Midsize Market with Lower Cost, Greater Scalability

Big Blue continues its push of entry-level mainframes into midsize companies with aggressive pricing, 28 capacity levels

Q&A: Securing Mobile Workers

By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.

Disabling Rogue WLAN Access

Detect, then actively block, unauthorized WLAN users

Five Signs Your Enterprise Needs Distributed Security

After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.

Worst Security Problem: Attachments

Security policies and education aren't enough

And The Winner Is...

In a market with few innovations, we find some noteworthy achievements among storage vendors and their promoters.



Oracle Revamps JDeveloper for Grids, Ease-of-Use

Company says its new JDeveloper 10g IDE delivers a J2EE development environment that simplifies J2EE coding non-Java programmers and facilitates development for computational grids.

BMC to Web Services-Enable Service Management Tool

Company says Web services interfaces can simplify how customers and partners integrate SIM with their applications and products

Job Scheduler Re-emerges as Workflow Automation

Tidal Software's Enterprise Scheduler can automate jobs based on “business calendars” so operators can run a job on relative dates (such as the first and third Thursdays each month)

IT Briefs: Dell/Oracle Alliance, Datasweep Release, Microsoft Forms RFID Council

Dell to include Oracle database software in PowerEdge servers; Datasweep releases J2EE version of Datasweep Advantage Suite Version 6.0; RFID council formed

Storage Growth: Lowering The Limbo Stick

The reality is that demand for more storage is not growing as much as originally forecast—and the forecast revisions are significant. How are analysts deriving their numbers?

Case Study: Securing Mail Transactions in Any Form

Encrypting information and keys in hardware

Businesses Ignore Mobile PDA Threat

When it comes to mobile devices, why do so many companies avoid the security issues?

In Brief

Cisco sign-on, IE cross-scripting lead vulnerabilities this week

Q&A: Scaling Application Expertise Helps the Help Desk

Mercury Interactive's new Resolution Center encapsulates expertise for first-tier help desk personnel

Five Ways to Promote Your IT Department and Gain User Support

From newsletters to user surveys, making your IT department more visible to end users offers big rewards

Swap Green Screens for a Web Interface in Under an Hour

IBM says its HATS tool can quickly expose mainframe applications to the Web

Reader Mail: A Response to the FCIA

The author outlines 10 reasons why he disagrees with the FCIA's view of FC SANs

Security Briefs: Encrypted Attachments Carry Threats

Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.