Disaster recovery planning must become an integral part of application development so the right middleware and coding choices are made at the outset of system design.
Big Blue continues its push of entry-level mainframes into midsize companies with aggressive pricing, 28 capacity levels
By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.
Detect, then actively block, unauthorized WLAN users
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Security policies and education aren't enough
In a market with few innovations, we find some noteworthy achievements among storage vendors and their promoters.
Company says its new JDeveloper 10g IDE delivers a J2EE development environment that simplifies J2EE coding non-Java programmers and facilitates development for computational grids.
Company says Web services interfaces can simplify how customers and partners integrate SIM with their applications and products
Tidal Software's Enterprise Scheduler can automate jobs based on “business calendars” so operators can run a job on relative dates (such as the first and third Thursdays each month)
Dell to include Oracle database software in PowerEdge servers; Datasweep releases J2EE version of Datasweep Advantage Suite Version 6.0; RFID council formed
The reality is that demand for more storage is not growing as much as originally forecast—and the forecast revisions are significant. How are analysts deriving their numbers?
Encrypting information and keys in hardware
When it comes to mobile devices, why do so many companies avoid the security issues?
Cisco sign-on, IE cross-scripting lead vulnerabilities this week
Mercury Interactive's new Resolution Center encapsulates expertise for first-tier help desk personnel
From newsletters to user surveys, making your IT department more visible to end users offers big rewards
IBM says its HATS tool can quickly expose mainframe applications to the Web
The author outlines 10 reasons why he disagrees with the FCIA's view of FC SANs
Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.