Vendors issue public challenges to Redmond about security in Windows, other Microsoft products
Companies contest how patent applies
EMS 3.0 helps IT admins reduce waste with expanded monitoring, reporting capabilities
Possible vulnerability in SMB implementation affects Windows Vista, Windows Server 2008, Windows 7 release candidate
Deep role-based access controls improve protection of critical data, reduce compliance workload
How data visualization techniques can encapsulate vast amounts of data into intensely visual and data-rich displays.
In the online banking segment, some industry watchers warn, the bad guys are winning the war against unsuspecting account holders.
Management shuffling is not what this company needs.
IDC says worldwide server revenues decreased over 30 percent
Big Iron shops have two options to run their Windows applications on System z: emulation via z/Vos or full-blown porting via Mono.
Backup is a necessary evil whose hard costs (including disk, bandwidth, and software) are easy to calculate. Beware these three not-so-obvious costs that can cost IT thousands of dollars.
Trusted Computer Solutions software flexibly manages security within large virtual environments
In this first installment in our three-part excerpt adapted from The Data Access Handbook, authors John Goodson and Rob Steward explain why benchmarks and how your database applications fit into the picture.
Five fixes will address remote code execution exploits in Windows
Features extend Ensemble’s ability to connect, orchestrate systems across the enterprise, improve message handling
Data protection and recovery solution for virtual machines reduces time, resources required to create backups
Company calls it foundation of its virtualization portfolio
New Application Identity Manager provides secure, robust authentication methods for App2App environments; helps streamline, support audit requirements
First major update of its flagship database in two years
Second warning about vulnerabilities