Enterprise


HP, IBM Poised to Lock Horns Over Data Warehousing

Companies are on a collision course in the enterprise data warehouse space

Securing Storage, Part II: Encryption is Only a Start

Storage security needs a more systemic view to succeed.

DataDirect Accelerates DB2 for z/OS Performance

New feature lets coders use static SQL for scenarios in which they might otherwise depend on dynamic SQL

The Summer’s First Blockbuster: IBM Unveils POWER6

IBM claims that its new System p p570 offers three times the performance of a comparable Superdome system from HP

Rumors of War Underscore Data Security Issues

Our storage analyst, Jon Toigo, begins a series on data security issues and solutions.

Security Professionals Allege RDP Vulnerability

Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.

Microsoft Pushes Non-Security Security Update

IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.



OpenSEA Alliance Sets Sights on LAN Security

A new nonprofit industry group works to push IEEE 802.1x as the basis for open source client-side security.

Darknets for Application Service Providers

Despite mature technologies from firewalls to antivirus, and in the face of heightened user expectations and business needs, keeping your enterprise secure is harder than ever. Darknets offer an effective way to increate your security intelligence.

Careers: The Global War for Talent

Globalization is ushering in a new era of competition – for talent. As a result, organizations will be hard-pressed to attract and retain key IT talent

Building an Archive: End of a Six Part Series

Is the obvious so difficult to understand? Obviously, yes.

IBM Greenlights Eco-Friendly Data Center Initiative

Big Blue’s Project Big Green is one of the most ambitious energy-focused IT offerings yet

Using Virtualization to Maximize Centralized Computing Data Center Resources

Moving to a virtualized environment can improve the efficiency of your IT infrastructure. We explain how to determine the best configuration for your environment.

PSI: The Newest Plug-Compatible Mainframe on the Block

PSI officials pledge to indemnify customers against liability and expect a return to normalcy -- post-litigation -- with Big Blue.

Keeping the Real in Real Time

From speed to XML parsing, several factors must be addressed to improve a server’s ability to reliably serve real-time data. We explain what you need to know.

The Fall and Rise of Network Access Control

There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?

Private Lessons: Public Sector Notes on Security

Although the spotlight tends to shine on the poor grades federal agencies receive for their information security efforts, notable security successes in government are often overlooked.

Microsoft Moves to the Forefront of Security

Microsoft’s recent flurry of security acquisitions finally results in a product announcement: Microsoft Forefront Client Security.

Coming to Terms with SOA’s Demands

IT organizations must come to terms with SOA’s much more rigorous planning, testing, and management requirements

Building an Archive Strategy, Part V: The Devil in the Details

What every storage admin must ask: what must we save and where shall we save it?