New '04 release features BI, portal, and EAI components
The long-term relevance of the mainframe has been one of IBM’s major themes. If 2003 was any indication, there's no doubt that customers agree. As the mainframe prepares to celebrate its 40th birthday this April, analysts take note of its success, and explore how organizations are planning to put the increased processing power to work.
SCSI implementations may be different in terms of the way data packages flow, but all are members of the same family. Arguments over the superiority of any implementation are heated.
Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.
Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.
The University of Colorado Hospital struggled to keep its network secure to comply with HIPAA regulations, made difficult because IT didn't have direct control over some connected systems.
Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly
One way organizations can gain maximum value from IT is to unify the entire enterprise IT portfolio into a single, cohesive whole. Only with this kind of "convergence" can technology truly deliver the ROI, and bottom-line benefits, so avidly sought.
Big Blue will offer tools from Informatica to help new customers move data from Oracle, SQL Server, and other DBMSs
Many vendors are touting storage solutions for Sarbanes-Oxley compliance, but only one company tells it straight—SOX isn't a storage issue at all.
Organizations are starting to organize applications, hardware, and even network assets, into portfolios, managing them as though they were part of an investment portfolio. Besides cutting costs, using the portfolio approach can provide a more-disciplined approach to application development investment.
Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.
Rainfinity's GridSwitch streamlines moving data across platforms for NFS- or CIFS-mounted storage devices.
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
The battle to capture your e-mail address has gone to new levels: deleting competing worms.
Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.
Company says DB2 version 8 will deliver the biggest feature and functionality update in the database’s history.
SCO backed up its threats with action, taking two enterprises to court over their use of Linux.
IBM outpaced competitors HP and Sun in worldwide server revenue growth.
A study of two companies shows that modified code can increase defects three-fold. It takes disciplined inspection and continuous software-development process improvements to increase software quality.