Enterprise


IBM Announces ETL Tools for Migrating to DB2

Big Blue will offer tools from Informatica to help new customers move data from Oracle, SQL Server, and other DBMSs

The Last Regulatory Compliance Article You'll Ever Need

Many vendors are touting storage solutions for Sarbanes-Oxley compliance, but only one company tells it straight—SOX isn't a storage issue at all.

To Cut IT Costs, Manage Resources Like an Investment Portfolio

Organizations are starting to organize applications, hardware, and even network assets, into portfolios, managing them as though they were part of an investment portfolio. Besides cutting costs, using the portfolio approach can provide a more-disciplined approach to application development investment.

February Sets Virus Record

Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.

A Smart Solution for Data Migration

Rainfinity's GridSwitch streamlines moving data across platforms for NFS- or CIFS-mounted storage devices.

Case Study: Protecting Intellectual Property on the Go

Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.

Worm Writers One-Up Each Other

The battle to capture your e-mail address has gone to new levels: deleting competing worms.



Touching SAP Data: User Access and Biometrics

Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.

IBM to Supercharge DB2 for z/OS in Version 8 Upgrade

Company says DB2 version 8 will deliver the biggest feature and functionality update in the database’s history.

SCO Back on the Warpath

SCO backed up its threats with action, taking two enterprises to court over their use of Linux.

Big Blue Rides zSeries to Server Market Crown

IBM outpaced competitors HP and Sun in worldwide server revenue growth.

The Perils of Modifying Software

A study of two companies shows that modified code can increase defects three-fold. It takes disciplined inspection and continuous software-development process improvements to increase software quality.

Aligning Storage Costs with Business Priorities

A proposal for a “three dimensional approach”: automating storage provisioning and device management, data movement, and data replication.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Alerts

New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Solving Application Problems: IT Still Stuck in Reactive Mode

Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.

How to Avoid Problems When Wireless-Enabling Your Application Infrastructure

From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.