Enterprise


Blunt Advice for IT Follows TJX Breach

Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.

Bolted-on Archive Solutions: Ingestion Indigestion—Part IV of a Series

As with everything else in IT, performance is a key consideration when selecting a backup solution. Finding a reliable measure, however, is problematic.

Five Rules for Development-time SOA Governance

In our rush to adopt new technologies, we sometimes forget old disciplines that supported rigorous software development. Here are five rules that can help IT reduce the risk of failed SOA initiatives.

Kicking the Tires on Compuware OptimalJ

Why Compuware’s application-lifecycle toolset helps set it apart from competitors

Why Vista Was Vulnerable to Animated Cursors

Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.

Seven Best Practices for Managing Physical and IT Security Convergence

How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.

Behind CA’s Storage Reshuffle

The move will likely have mixed impact on most CA customers, although mainframe shops should expect some benefits



Complaisant or Compliant: Training Employees to Care

In compliance, a focus on technical security can eclipse human factors. Particularly in IT compliance, a focus on technical security tends to eclipse human factors, with serious compliance implications. Good training programs need to be measured, controlled, and incorporate feedback loops so that the people responsible for the rulemaking getinput from the enforcers and (more importantly) from the employees who are subject to them.

Seeing Your Application Through Your End Users’ Eyes

End- user experience management is becoming an important component for ensuring the success of Web-based applications.

Built-in Archiving: Use at Your Own Risk -- Part III of a Series

Can non-native archive management software improve the performance of the e-mail server by automatically archiving messages without user intervention?

Why PowerTech Group Wants to Update Your AS/400 Security Model

If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention

IBM SOA Institute Targets U.S. Federal Organizations

Center will focus on SOA development, education

Outsourcers Must Plan Their Chindia Strategy

Industry analysts at Gartner say forward-thinking companies must develop what they call a “Chindia” strategy

IBM’s Fundamental Impasse: At Least Both Sides Are Still Talking

Fundamental Software has run smack up against Big Blue’s refusal to sanction 64-bit mainframe emulation

Moving Targets: The Risk of Mobile Devices

Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.

Emulation Licensing Problems Put FLEX-ES Shops in Limbo

Even as IBM and Fundamental continue to wrangle, FLEX-ES shops are dwelling in a kind of limbo. First in a series.

Securent Middleware Moves Authorization Out of Individual Apps

Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.

Analysis: Behind Software AG’s Acquisition of webMethods

The deal helps position Software AG as an ascendant SOA player in both North America and the EU

Getting the NAC of Network Access Control

Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.

JavaScript Hijacking Vulnerability May Not Dampen AJAX Enthusiasm

A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.