Enterprise


NuView Sequels Keep Coming

StorageX answers a specific problem with a good solution. But how can the company cope with a niche solution that refuses to remain just a niche solution?

Vulnerabilities: IE Cross-Domain Security Flaw, Database Component Exposure

Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code

Best Practices in Security Training

Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.

Sobig Lives Up to Its Name

It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered

IBM Entices Customers to zSeries

IBM announced it will offer customers significant new incentives—including dramatically reduced software license costs and zSeries rebates—to move non-traditional mainframe applications

Q&A: IBM Talks Power5

With Power5, IBM introduced Simultaneous Multithreading, in which each of the processors on the chip looks to the software like two processors. The technology offers 40 percent more performance.

SCO Update: Users Say They'll Stay the Course

Though SCO disclosed examples of copyrighted code in Linux, most users were unimpressed, and few say they'll change their plans—for now.



SAP Server Consolidation: Consider Linux, Analyst Says

zSeries/SAP consolidation offers cost savings and performance potential that enterprises should consider, Sageza Group reports

Hitachi Data Systems' Hu Yoshida Looks Ahead

The author of a foundational white paper is struggling to figure out what the storage utility model really is.

Worm Continues Blast Across Internet

Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely

Passwords and Identity: Seeking Synergy

Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.

Alerts: BSD and Postfix Vulnerabilities; File-Sharing Dangers

New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing

HP World Recap: Adaptive Enterprise Strategy Can Save Companies Big Bucks

Fiorina touts Adaptive Enterprise, attacks Dell; company introduces new disaster recovery service at Atlanta conference

Careers: No Vacation from Job Stress

IT professionals return to find accumulated problems; some must interrupt vacations to solve problems remotely

T-Rex Roars in Canada

“Workload License Charges” payment plan lets mid-size customers pay only for the portion of z990 capacity they need

Multi-OS Hardware: The Next Step in Server Technology (Part 2 of 2)

Running multiple operating systems on a single server brings big benefits. In the second article of this two-part discussion we look at the last of three benefits (an increase in application choices)

Ten Storage-Related Jobs You Don’t Want

Plus a few you might want to think about

Case in Point: Protecting the Network Edge

Japanese university finds easy way to control network access

Alerts: Vulnerabilities in IE, Windows Desktops

MiMail.A exploits IE flaw; Autorooter targets windows hole to run its own code

How To Protect Yourself from Fibre Channel Insecurity

Vendor and end-user ignorance perpetuate security holes, security architect warns