How do you ensure that your encryption solutions effectively secure all your sensitive data?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Three updates are "critical"
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The enterprise OS-scape could experience disruptive shocks during the next five years
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IBM highlights enterprise, user-enabled application development Mashup Center
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Aster Data Systems says new analytic platform can scale to handle large data volumes for analytic BI
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    "What if we were to add a new product? What if we added 10 new salespeople? What if we built a plant in China?" Those sorts of complex business questions about the future call for business modeling. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Patient records compromised
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What business users really want is self-serviceability, says Composite Software -- and that's just what Composite's new Discovery appliance gives them.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Time to get compliant: industry watchers see XBRL adoption as a fait accompli
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If the number of mission-critical business applications is growing, why are employees still suffering from poor application performance?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A prominent mainframe reseller gets absorbed by one of its competitors. What does the acquisition mean for its customers?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Paying for word processing software may soon be a thing of past
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How to determine that your “secure environment” has all the bases covered.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why the threat of theft-from-within is keeping enterprise CIOs up at night
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    VTL and de-duplication, tape versus disk -- a possible new answer looms on the horizon.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Four new features will help system administrators manage and test a company's Internet access security
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Workaround involves disabling Symantec application before installing XP SP3