Enterprise


EMC on the Brain

Vendors must learn that juxtaposing one’s own products with EMC’s as a means for advancing one’s own value proposition is silly.

Accelerating Security Certification

Can information security professionals really get certified in half the ordinary time?

Finding Security Holes in Your Web Applications

The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security

Authentication: Three Critical Steps for Every Organization

Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.

Mainframe Technology Trickles Down to iSeries

A new iSeries offering provides mainframe-like features—advanced backup, replication, and high-availability clustering—across IBM's eServer product line.

Enterprise Surprises: Where To Find Those Elusive Profits

The secret: an integrated business design

Python Offers Intelligent, Provocative Approach to Tape Automation

Spectra Logic proves it offers products and pragmatism; Python will raise the bar for other vendors.



Best Practices: Handheld Security

Handheld security expert suggests best practices for organizations that support the devices

Dirty Dozen Viruses: August was a Banner Month

Central Command shows a single virus accounted for over three-quarters of all activity last month.

Alert: “Critical” Flaw in Office, Other Microsoft Applications

Vulnerability in Microsoft applications occurs thanks to Visual Basic for Applications

Oracle Touts RDB to Show Its Heart

To allay PeopleSoft users' fears, company tries to show it can do right by an acquisition.

Case Study: The Demise of Dueling Desktops

Web-based solution simplifies connecting users to legacy applications for insurer

Survey: Getting More for Your IT Dollar

It's not about how much IT spends. World-class companies know how to spend their IT budget wisely.

Black Outs and Virii and Worms, Oh My!

Imation Corporation survey shows IT infrastructure poorly safeguarded, despite recent natural and man-made events

Seeking the Perfect Patch Process

To avoid the patch-and-pray cycle, IT organizations need to examine how to make vulnerabilities such as Sobig seem so small.

Alerts: CiscoWorks, P2P Software Vulnerable

Cisco details vulnerabilities in CiscoWorks; eMule code hiding in P2P software

Spammers Increasing Methods to Avoid Detection

Techniques for challenging and defeating spam filters continue to grow

BMC Partners with GoldenGate for Disaster Recovery

SmartDBA database management tool gets bi-directional data synchronization and replication capabilities.

Do E-mails Reveal Oracle's True Plans for PeopleSoft?

Advocates say Oracle's bid is an attempt to acquire the customer base or destroy the company, but were excerpts taken out of context?

Careers: Hiring Freeze

Just nine percent of CIOs say they plan to hire new IT professionals next quarter, while four percent expect further cuts.