In the age of SCO, patent suits are fraught with peril—especially for end users, who can find themselves simmering in the legal hot seat
2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs
How the thinking of a Jesuit priest can make a difference in IT/management communication.
Compuware’s Vantage Analyzer lets customers identify and isolate J2EE performance problems—including troublesome memory leaks
Oracle’s roadmap still leaves some questions unanswered—particularly for J.D. Edwards users. Company spokesmen reiterate support for existing users until at least 2013.
Chip giant Intel last week announced a reorganization of its business units, while HP announced new Itanium solutions and updated software for OpenVMS
Questar's OpenICDL.com helps in wide-scale adoption of desktop open source solutions
Sets new standard for managing diverse enterprise application and data integration requirements
ONStor delivers only enterprise NAS gateway with integrated virtual server and storage provisioning technologies, delivering on-demand storage for under $20,000
Revivio’s Time Addressable Storage is an important technology that also happens to work.
Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations
It’s no silver bullet, but those who have used XI say the product goes a long way to addressing most of their concerns
With as much as 75 percent of corporate data still sitting on the mainframe, Big Iron is a platform few BI vendors can afford to ignore
How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely
There’s little risk for CRM vendors who wish to get into the social networking game—and the potential upside is enormous
What's hot in security spending this year