IBM’s next-generation chip to debut in iSeries, the new name for the company's i5 line
Many of the services provided by IT departments are taken for granted by the user community. This is not necessarily a bad thing. Like the power company an IT department is doing a good job when service is being provided so consistently it can be taken for granted. However unlike a power company, the IT department is also engaged in projects to improve the company’s profitability and competitive edge.
Recent legislation doesn't mandate changes to your storage infrastructure, but it does mean you'll have to manage your data more effectively.
New software fixes mobile computers that deviate from corporate standards
New technology lets you hide and verify network identity inside the packets themselves.
TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol
Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
Outsourcing can bring lower costs and increased levels of service, but be sure your Service Level Agreement is part of your contract.
BMC's director of its MainView product discusses IBM's takeover of Candle, plus getting the best value from licensing
Twenty industry members say alliance will encourage and accelerate the development of grid solutions for the data center through interoperability solutions
International Data Corp. reports the first meaningful increase in IT spending since 2000—mostly in the western U.S.
Catalyst's visionary ComponentsNow marketplace for SAP users; Manugistics updates its progress on strategies announced at last year’s Envision conference, plus insight into company's view of its market
Big Blue continues its push of entry-level mainframes into midsize companies with aggressive pricing, 28 capacity levels
Disaster recovery planning must become an integral part of application development so the right middleware and coding choices are made at the outset of system design.
Detect, then actively block, unauthorized WLAN users
By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Security policies and education aren't enough
Company says its new JDeveloper 10g IDE delivers a J2EE development environment that simplifies J2EE coding non-Java programmers and facilitates development for computational grids.
Company says Web services interfaces can simplify how customers and partners integrate SIM with their applications and products