Big Blue will offer tools from Informatica to help new customers move data from Oracle, SQL Server, and other DBMSs
Many vendors are touting storage solutions for Sarbanes-Oxley compliance, but only one company tells it straight—SOX isn't a storage issue at all.
Organizations are starting to organize applications, hardware, and even network assets, into portfolios, managing them as though they were part of an investment portfolio. Besides cutting costs, using the portfolio approach can provide a more-disciplined approach to application development investment.
Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.
Rainfinity's GridSwitch streamlines moving data across platforms for NFS- or CIFS-mounted storage devices.
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
The battle to capture your e-mail address has gone to new levels: deleting competing worms.
Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.
Company says DB2 version 8 will deliver the biggest feature and functionality update in the database’s history.
SCO backed up its threats with action, taking two enterprises to court over their use of Linux.
IBM outpaced competitors HP and Sun in worldwide server revenue growth.
A study of two companies shows that modified code can increase defects three-fold. It takes disciplined inspection and continuous software-development process improvements to increase software quality.
A proposal for a “three dimensional approach”: automating storage provisioning and device management, data movement, and data replication.
An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.
New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files
Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.
Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.
The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.
Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.
From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.