Enterprise


SCO Targets Novell in Latest Lawsuit

Novell arrives as a Linux leader in a big way

IBM Will Increase Employment Faster than Originally Planned

Big Blue says it will create 15,000 more jobs globally, of which 4500 net jobs will be in the United States.

The Human Dimension in Disaster Recovery

Your disaster recovery plan must consider more than just protecting and restoring your data. Your staff has to be recovered as well.

Reducing Unsolicited E-Mail: Making Senders Pay

Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.

Best Practices: Collecting Computer Forensic Evidence

Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.

Briefs

Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000

Battling Blended Threats with Pattern Detection

IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.



Simulation and Modeling: Beyond Fear and Loathing

Fifteen to twenty years ago, simulation was over-hyped. Today it's time to investigate the wide range of cost-effective, working solutions for business design needs.

Serial ATA: Coming Soon to a Data Center Near You?

Industry watchers say that solutions based on the parallel ATA or Serial ATA standards are coming on strong, especially in disk-to-disk backup.

SCO to IBM: I’ve Shown You Mine, Now Show Me Yours

SCO has at last turned over a list of files and code snippets it claims violate its intellectual property rights.

Why Systemic Storage Problems Remain Unsolved

Last year saw a dearth of real industry leadership, especially in storage technology, and a lot of posturing and posing. Why can't innovators with great ideas find venture capital?

Securing Mobile Workers

The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.

Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.

Briefs

Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught

SCO/IBM: Readers Respond

Strong responses mostly positive

IBM's Latest Blades Show Slim Is In

All grown up, blade servers are seen as a complement to mainframe and large Unix systems. Now they're slimmer than ever—just one of recent trends in this hardware.

Apple Joins Big Unix Server Race with Xserve G5 and Xgrid

Apple claims the new server packs about 60 percent more punch that the previous G4.

Resolutions for 2004: My Suggestions for Storage Vendors

Our storage columnist offers vendors four simple goals for the year ahead.

BRIEFS: Network Storage Rules; Anti-Virus Software; Choosing a Mail Filter

Learn Network Storage Security Rules; Free Anti-Virus (For A Year)