Enterprise


Beyond Real Time: Tibco Aims for Predictive Business

Company promises to deliver enterprises that can predict—and plan for—the future.

IBM Brings Lotus Notes into Instant Messaging Era

Version 6.5 of Notes and Domino adds built-in IM, plus better spam defenses, improved compression, and encrypted e-mail.

Ten Tips for Potential Telecommuters

The best and most frequently cited advice gathered from nearly 2000 tech workers

IBM Modernizes, Consolidates Enterprise Modernization Tools

Big Blue consolidates Host Access Transformation Server and Host Publisher, offering a more customer-friendly and intelligently packaged solution

Catching Up With CA

Computer Associates' BrightStor team presents an impressive display of management applications

Coping with the Gramm-Leach-Bliley Act

We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.

Alert: Virus Masquerades as Microsoft Security Update

New worm targets old IE vulnerability.



Security Spending Will Top All IT Investments

IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.

Big Blue Pushes New Grid Bundles, Customer Wins

Morgan Stanley says new computational grid delivers significant new performance in financial analytics.

Top Ten Mission-Critical Network Management System Functions

Managing network changes has never been more critical. Here are ten functions a good network management system should provide.

HP Indemnifies Customers Against Linux Liability

Hewlett-Packard indemnifies customers against possible SCO lawsuits

Security Experts Warn Microsoft's Pervasiveness Puts Companies At Risk

Dominance of the Windows platform, coupled with its insecurity, can't be ignored any further, one security analyst warns.

Best of the Fall Trade Shows

From panel discussions to workshops (where you can ask your own tough questions), this fall's trade shows offer a wealth of information and perspective from vendors big and small.

Best Practices: Staying Ahead of International Regulations

From carrots to sticks, a variety of recent regulations has presented a challenge to security managers. We ask a security expert where U.S. and European regulations are headed.

Alert: Vulnerability in SSH

Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.

CERT: Best Practices for Beating Worms

CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.

Career Satisfaction: Take Our Quick Quiz

Answer ten short questions to gain insight on how satisfied you are with your career.

IBM Touts zSeries to Simplify IT Infrastructure

Big Blue discusses the idea of reducing network and application tiers, and offers a model that combines zSeries technology with Intel-based server blades.

Unlikely Partnership for Next-Generation Web Services

IBM and Microsoft are fierce competitors, but they've united to deliver protocols that will deliver a reliable and secure messaging and transactional infrastructure for heterogeneous environments.

Microsoft "Humbled" by Recent Security Problems

Microsoft CEO Steve Ballmer acknowledged last week that his company has been "humbled" by the effects of the Blaster and Sobig.F worms, and outlined his company's "comprehensive approach for better se