Executive Briefings


When It Comes to ILM, Storage Vendors Want to Lock You In

When it comes to information lifecycle management, storage hardware vendors want to lock you in to their platform.

Reader Feedback: Management's Web-Services Push Meets IT Resistance

Many IT pros remain skeptical about service-enablement, but—as a growing number are finding out—they don’t have a choice in the matter

Design as a Signature Skill for the Knowledge Economy

The knowledge economy makes all of us designers every day. We need to become more adept at inventing and crafting new solutions to new problems.

Solid Infrastructure Paramount to Successful Outsourcing

Implementing a preventive methodology helps establish a solid infrastructure, raising the outsourcing organization's accountability, forcing them to write better code

Case Study: Energy Company Monitors IM

The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.

Has Information Lifecycle Management Arrived?

Is enterprise content management the next new panacea?

Business Rules a Tough Sell to Veteran IT Pros

Some suggest that BRM is just a crazy notion in a technology utopia



A Three-Step Program for Improving Software Quality

Reliable, high-quality software can be yours if you incorporate these three principles into your development

Best Practices: Defending Against Insider Attacks

A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.

IT Under Siege from Business Rules Management

BRM proponents want to do away with tasks many IT pros take for granted

Q&A: Is Microsoft's Security Trustworthy?

Three years after Microsoft launched an initiative to improve its products’ security, we talk to information security veteran Gary Morse, president of Razorpoint Security Technologies, about the results.

Case Study: A More Resilient Application Infrastructure

Company taps on-demand delivery model to enhance retail management application

IT Spending Optimism Disappears

IDC revises its IT spending estimates downward, IBM plans to cut 10,000 or more jobs—and things could get tougher still

What Security Provisions Do We Really Need?

Proof is in the pudding….but no one seems to be in the kitchen

Q&A: The Future of Service-Oriented Architecture Security

WS-Security, Liberty, and SAML play nice together

Crafting Uniqueness in Knowledge Work

The essence of good knowledge work is creating outputs of appropriate uniqueness not uniformity.

Rx for Software Quality Woes: Testing, Testing, and More Testing

Companies that implement a centralized software-testing program report higher quality levels than companies that don’t

Spend Less, Secure More

Companies that better target their security spending actually spend less and have more effective security programs

Q&A: How to Secure a Critical Infrastructure

A cybersecurity group works to improve security in the chemical industry.

Trends: End-User Application Development using Business Rules

The business rules approach is gaining ground—and has proven successful in the most unlikely of environments: long-time mainframe shops.