Development efforts are growing, and they’re finishing on time, new research says
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.
Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits
Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.
The five-year run-up to Windows Vista culminated with the official consumer general availability of Vista and Microsoft Office 2007.
A new exploit potentially lets an attacker execute code on a user’s machine
We explore new research with the author of “My Life is Failure -- 100 Things You Should Know to be a Successful Project Leader” so you can learn from the mistakes of others.
Web 2.0 technology is helping firms bring applications to market faster than ever.
PSI strikes back, charging IBM with antitrust violations, unfair competition, and business torts
After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?
How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.
PGP Corporation may have the handle on protecting sensitive data everywhere
Information protection has transformed from protecting the network to protecting the information -- wherever it resides.
Seven simple questions can help you assess change-related risk and gauge the effectiveness of your change-management process.
Is Microsoft's Vista responsible for a push to hybrid drives?
With a little prioritization, setting up a network security plan doesn't have to eat up all your time.
IBM has done a lot to help revitalize the mainframe, Big Iron technologists say, but there’s still much work to be done
Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.
Last week we explained the four key factors in tiered storage. This week we explore how to align your storage strategy with business requirements.