Enterprise


Network Admission Control: Balancing Security and the User Experience

Two strategies and a dozen tips help you improve your user’s NAC

For Job Security, Go with Z

zNextGen professionals say they’re drawn to Big Iron for the same reason as many older mainframes: staying power

Microsoft Forefront: Strictly Business

Microsoft doesn’t put enough edge into its security products, yet.

Careers: "Total Rewards" Packages Key to Employee Happiness, Motivation

IT organizations are hip to the fact that they’ve got to have the right people with the right skills at the right time to keep things humming along

zNextGen Takes Off at SHARE

More zNextGen grads were in attendance at last week’s SHARE get together than at any previous user conference, SHARE officials say

A Guide to Daylight Saving Time Updates

The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless



CA’s zIIPy Masterstroke

CA says organizations can offload some management tasks from their expensive mainframe general processors onto cheaper zIIPs

Standards-Based Storage, Part II

Only when the pain and cost of the status quo becomes too great to bear will users start to make some noise.

Survey Reveals Global Sourcing Trends

From smaller deals to an increased interest in China, the face of outsourcing is changing, a new survey reports

Planning for Pandemics and Other Disasters

In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.

IBM Executes on Mainframe Simplification Agenda

Big Blue touts simplified mainframe admin features along with new versions of Tivoli, WebSphere, and DB2 software for z/OS

Storage Standards, Part I: PBS or Reality TV

Are standards something we should really care about?

Vista Buffer-Overflow Vulnerabilities Exposed

Hackers can take control of a Vista machine

IBM Preps z/VM Overhaul

z/VM 5.3 might still be five months away, but many VM programmers are already licking their lips in anticipation

Beyond the Crudware Complex: Planning Smarter IT Investments

Technology acquisition is a complex, often speculative task. Whether the means is build or buy, long-term value goes unmeasured and unrealized. The result is vaporware—or worse. What's the solution to spending savvy? A little-known framework for IT investment management could provide the answer.

Cyberethics: What the Public and Private Sector Misses

In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.

The New Bounce in Sun’s Step

From its chip strategy to its datacenter-in-a-box initiative, Sun has been reinvigorated

SOA, Better Value Driving System i Renaissance

Some industry watchers think Big Blue’s midrange workhorse might have finally turned a corner

CA Unveils Host-Based Intrusion Prevention System

As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.