Sometimes the smartest thing an organization can do is pull the plug on an ailing project—regardless of how much time and money it’s invested in it
ISO 17799, the world’s most-used information security framework, gets updated.
Perfection is indeed a worthy goal….and we try.
For years companies have been requiring more business know-how in technical positions. But demand for compliance-specific knowledge is a relatively recent development. What sorts of training should IT professionals consider to stay relevant?
Support for z/OS is still gestating, however, and extending TotalStorage Productivity Center to OS/400 will be difficult, too.
What exactly is spyware? Just as with viruses, discussion of malware, grayware, adware, and spyware often gets hung up on definitions, and lately even legal threats over classifications.
While salaries are rising, angst is also up.
These days, utility computing is ascendant, and IBM Corp., Hewlett-Packard Co., Sun Microsystems Inc. and other vendors have positioned grid computing as an important subset of their respective utility computing visions.
Five mistakes to avoid when moving any operations offshore
Infrequent updates in security products themselves can be dangerous
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
There are bright spots in our salary survey, particularly in the western U.S.
There are seven ground rules for aligning business strategy with IT. Flub any one of them and you can kiss your alignment aspirations goodbye.
The mints get passed as the conversation turns to information lifecycle management.
Cost savings are only one of a host of benefits of moving operations offshore.
Compensation is up in almost all of the positions surveyed, but bonuses have been wavering.
Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.
Food to soothe the savage beast…..and maybe solve some problems.
IBM’s decision to eighty-six its DB2 OLAP Server has ramifications for mainframe and iSeries shops
To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach