In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.
Hackers can take control of a Vista machine
z/VM 5.3 might still be five months away, but many VM programmers are already licking their lips in anticipation
From its chip strategy to its datacenter-in-a-box initiative, Sun has been reinvigorated
Oracle this week announced its first rev of ODI, along with an updated version of the Oracle Secure Enterprise Search tool it announced a year ago.
With PerformancePoint, Microsoft has a plausible reason to crow.
For SME firms with limited IT know-how, BI is an especially tough nut to crack. It’s a nut BI players of every stripe desperately want to crack, however.
What's on SPI Labs' list of top Web application security threats it expects this year?
Some industry watchers think Big Blue’s midrange workhorse might have finally turned a corner
Development efforts are growing, and they’re finishing on time, new research says
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.
Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits
Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.