Enterprise


Report: Last Year Was Worst Ever for Viruses

Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.

Which Bugs Will Bite? Vulnerability Predictions for 2004

Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.

Q&A: One IDE to Rule Them All

The Eclipse Project, an open source development initiative, is growing by leaps and bounds.

The New Document Specialist?

IBM makes its third document-management acquisition as retention regulations spur market growth.

SCO Fine Tunes Its Claims; Court Deadline Looms

A preliminary ruling in December sets this week as the deadline for providing specific Linux code misappropriation examples to IBM. "Derivative works" is the focus of SCO's argument.



Setting Up Policies the Arkivio Way

While many products today talk a good game about policy-based data management, Arkivio is once again ahead of the pack.

Alerts: Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats in November

From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.

Mainframe Security: Good Enough for the 21st Century?

The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.

Q&A: Arresting Bugs Earlier in Development Cycle Cuts Security Costs

How integrating security code testing into the development cycle saves time and dollars

Commentary: Solving Internet Crime Needs International Approach

Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.

Q&A: Application Modernization Strategies

We spoke recently with Jim Rhyne, a distinguished engineer and eServer tools and enterprise modernization architect with IBM. Our discussion ranged from the scope of enterprise modernization (hint, companies often fail to adequately anticipate skills modernization), the phenomenon of mainframe brain drain (Rhyne isn’t convinced that there’s anything to it), application modernization strategies and, of course, the maturity of the Web services standards themselves.

Breaking the Next Storage Barrier

Worldwide disk storage systems sales could easily reach an exabyte by next year.

DBMS Licensing Woes Turn Customers to Open Source Systems

Customers losing patience with negotiating database licenses are increasingly adopting open source DBMSes such as MySQL

Ten Technology Predictions for 2004

Analysts from professional services firm Tallán explain the trends IT must manage next year.

Happy Days Are Here Again – Sort Of

Spending on storage and software should grow fastest next year. Among CIOs' top priorities next year: cost reduction, security, application integration, and Sarbanes-Oxley compliance.

Of File Systems and Databases, Part 2: Clustered File Systems

Clustered file system advocates have positioned their solutions as alternatives to the monolithic file systems (such as WAFL).

Q&A: Protecting Web Applications from Unknown Attacks

Companies must protect their data as well as their reputations.

Security Budgets Will Rise Rapidly, Researchers Predict

Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also