Enterprise


SOA Finally Living Up to its Hype, Survey Shows

Development efforts are growing, and they’re finishing on time, new research says

CA Unveils Host-Based Intrusion Prevention System

As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.

Seven Strategies for Compliance Change Management

Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.

Business Process Discovery: The Key to Mainframe Modernization

Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits

VMware Workstation 6 Beta Begins

Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.

Vista's Rolling Start is Now Official

The five-year run-up to Windows Vista culminated with the official consumer general availability of Vista and Microsoft Office 2007.

Yet Another Word Zero-Day Exploit Surfaces

A new exploit potentially lets an attacker execute code on a user’s machine



Podcast: How to Avoid Project Management Failures

We explore new research with the author of “My Life is Failure -- 100 Things You Should Know to be a Successful Project Leader” so you can learn from the mistakes of others.

Innovative Web 2.0 Firms Storming the Next IT Battleground

Web 2.0 technology is helping firms bring applications to market faster than ever.

PSI Strikes Back Against IBM

PSI strikes back, charging IBM with antitrust violations, unfair competition, and business torts

Analysis: Intel, Sun Tie the Knot

After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?

Migration Readiness Assessments, Part 2: Reaping the Benefits

How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.

PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

Beyond the Firewall: Protecting Information Outside the Network

Information protection has transformed from protecting the network to protecting the information -- wherever it resides.

The Seven R’s of Change Management

Seven simple questions can help you assess change-related risk and gauge the effectiveness of your change-management process.

Hybrid Drives: Good Architecture or All Flash?

Is Microsoft's Vista responsible for a push to hybrid drives?

Step by Secure Step: Network Security Planning

With a little prioritization, setting up a network security plan doesn't have to eat up all your time.

System z: What IBM Still Needs to Do

IBM has done a lot to help revitalize the mainframe, Big Iron technologists say, but there’s still much work to be done

Case Study: Breaking the One-Stop-Shop Rule

Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.

Demystifying Enterprise Tiered Storage, Part 2 of 2

Last week we explained the four key factors in tiered storage. This week we explore how to align your storage strategy with business requirements.