StorageX answers a specific problem with a good solution. But how can the company cope with a niche solution that refuses to remain just a niche solution?
Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code
Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.
It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered
IBM announced it will offer customers significant new incentives—including dramatically reduced software license costs and zSeries rebates—to move non-traditional mainframe applications
With Power5, IBM introduced Simultaneous Multithreading, in which each of the processors on the chip looks to the software like two processors. The technology offers 40 percent more performance.
Though SCO disclosed examples of copyrighted code in Linux, most users were unimpressed, and few say they'll change their plans—for now.
zSeries/SAP consolidation offers cost savings and performance potential that enterprises should consider, Sageza Group reports
The author of a foundational white paper is struggling to figure out what the storage utility model really is.
Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely
Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.
New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing
Fiorina touts Adaptive Enterprise, attacks Dell; company introduces new disaster recovery service at Atlanta conference
IT professionals return to find accumulated problems; some must interrupt vacations to solve problems remotely
“Workload License Charges” payment plan lets mid-size customers pay only for the portion of z990 capacity they need
Running multiple operating systems on a single server brings big benefits. In the second article of this two-part discussion we look at the last of three benefits (an increase in application choices)
Plus a few you might want to think about
Japanese university finds easy way to control network access
MiMail.A exploits IE flaw; Autorooter targets windows hole to run its own code
Vendor and end-user ignorance perpetuate security holes, security architect warns