Enterprise


2006 ESJ Salary Survey, Part 1: Salaries Grow for All IT Staff Positions

In the first of our four-part report, we look at compensation growth for professional positions.

Development Environment Detrimental to Application Security

A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers

Building Storage, Part III

Acquisitions, new releases, value-added hype --- what can we believe and who is offering something new?

Two-Factor Authentication: The Single Sign-on Solution?

New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines

Open SOA Sells—But Microsoft Isn’t Buying

Microsoft’s absence in new initiatives troubles industry watchers

Hierarchical Usage Models (Part 2 of 3)

Using a layered approach can help expand usage analyses to more complex projects.

Podcast: Creating Strategies to Prevent Internal Threats

Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.



How Automation Can Improve Business Service Management

Is IT getting the most from its BSM investments?

DataMirror Tweaks Mainframe CDC Tool for Performance, Reliability

DataMirror last week trumpeted what it describes as “significant” performance improvements in the latest version of its Transformation Server for z/OS

HP Bets Big on Software with Mercury Interactive Purchase

By putting $4.5 billion of its money where its mouth is, has HP finally put the lie to the canard that it isn’t serious about software?

Building Storage, Part II

The entry level price of "solutions-in-a-box" is rarely for a unit configured in a manner that most smart consumers are likely to deploy.

Filtering Technology Looks Beyond Content

Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.

A Framework for Platform Usage Models (Part 1 of 3)

Usage model analysis is essential to justify a deployment and quantify its value.

Podcast: Doing More with Less in the Data Center

The goals and differences of consolidation and virtualization.

Office 2007: Real Deal for Microsoft Developers

Forrester Research characterizes the Office 2007 system as a “serious” app platform that offers enterprise developers another option for building customized Windows clients and collaboration applications.

Ozzie: "Live" Not Risky for Microsoft

Microsoft's Windows and Office Live initiative isn't risky business, says newly installed Chief Software Architect Ray Ozzie.

Ballmer Heralds a New Era for Microsoft

Microsoft CEO Steve Ballmer says he will be more active in championing innovation within the company.

With New Storage Solution, More is Less

A new solution claims to offer the largest capacity for small and mid-size IT departments, expanding storage by 50 percent and claiming the lowest cost-per-gigabyte on the market.

Q&A: Automating Security Controls for Compliance

Can companies use built-in ERP capabilities to better automate their IT controls?

BMC, CA Tackle Mainframe Change in the Age of Compliance

Mainframe change management in an age of compliance is a very different beast