What's on SPI Labs' list of top Web application security threats it expects this year?
Development efforts are growing, and they’re finishing on time, new research says
Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.
Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits
The five-year run-up to Windows Vista culminated with the official consumer general availability of Vista and Microsoft Office 2007.
Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.
A new exploit potentially lets an attacker execute code on a user’s machine
We explore new research with the author of “My Life is Failure -- 100 Things You Should Know to be a Successful Project Leader” so you can learn from the mistakes of others.
Web 2.0 technology is helping firms bring applications to market faster than ever.
After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?
PGP Corporation may have the handle on protecting sensitive data everywhere
How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.
Seven simple questions can help you assess change-related risk and gauge the effectiveness of your change-management process.
Is Microsoft's Vista responsible for a push to hybrid drives?
PSI strikes back, charging IBM with antitrust violations, unfair competition, and business torts
Information protection has transformed from protecting the network to protecting the information -- wherever it resides.
IBM has done a lot to help revitalize the mainframe, Big Iron technologists say, but there’s still much work to be done
Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.
Last week we explained the four key factors in tiered storage. This week we explore how to align your storage strategy with business requirements.
Mainframe adoption should continue to take off in both existing and emerging markets.