Enterprise


And The Winner Is...

In a market with few innovations, we find some noteworthy achievements among storage vendors and their promoters.

Job Scheduler Re-emerges as Workflow Automation

Tidal Software's Enterprise Scheduler can automate jobs based on “business calendars” so operators can run a job on relative dates (such as the first and third Thursdays each month)

IT Briefs: Dell/Oracle Alliance, Datasweep Release, Microsoft Forms RFID Council

Dell to include Oracle database software in PowerEdge servers; Datasweep releases J2EE version of Datasweep Advantage Suite Version 6.0; RFID council formed

Storage Growth: Lowering The Limbo Stick

The reality is that demand for more storage is not growing as much as originally forecast—and the forecast revisions are significant. How are analysts deriving their numbers?

Case Study: Securing Mail Transactions in Any Form

Encrypting information and keys in hardware

In Brief

Cisco sign-on, IE cross-scripting lead vulnerabilities this week

Businesses Ignore Mobile PDA Threat

When it comes to mobile devices, why do so many companies avoid the security issues?



Five Ways to Promote Your IT Department and Gain User Support

From newsletters to user surveys, making your IT department more visible to end users offers big rewards

Q&A: Scaling Application Expertise Helps the Help Desk

Mercury Interactive's new Resolution Center encapsulates expertise for first-tier help desk personnel

Swap Green Screens for a Web Interface in Under an Hour

IBM says its HATS tool can quickly expose mainframe applications to the Web

Reader Mail: A Response to the FCIA

The author outlines 10 reasons why he disagrees with the FCIA's view of FC SANs

Security Briefs: Encrypted Attachments Carry Threats

Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

The Changing Face of Host Integration

Rather than moving host applications off the mainframe to save money, analysts suggest that it's time to look into service-oriented architecture

Q&A: Long-Distance Disaster Recovery

While the distance limitations of the technology remain unchanged, vendors have been demonstrating that extended-distance clusters can work

IBM Acquires Monitoring-Toolmaker Candle

Big Blue fills in gaps in its systems management portfolio by buyout of 28-year-old company.

The Sun Also Rises ... And Sets ... And Rises ...

Sun announces a development partnership with AppIQ, which offers a combo storage resource management/SAN management product called StorageAuthority Suite.

Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.

Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction