Software


IBM Expands Self-Healing Technologies

There's a Hole in the Server, eLiza, eLiza

CA’s Kumar Admits Challenges Ahead

Comes Clean on Service

IBM Ships New OLAP Server

Checklist Feature Parity, Baby

Network Management Cafeteria-Style

The Jewish Home and Hospital of N.Y. uses an assortment of products from a variety of companies to manage its network.

The Homeland Security Imperative

Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?



Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.

Wanted: Invisible Security

Technology workers think employers don't do enough to ensure their personal safety (and that of their property) but will strongly resist any security measures that might infringe on their personal life.

Homeland Defense: Are We Walking the Talk?

What's really happened to the security of information technology since Sept. 11?

The Integration Wave

Many of the seasoned veterans of the first generation of host integration are moving on to the next level—not only more tightly integrating their host platforms to the Web, but also linking into newer application environments from across their heterogeneous environments.

Financial Gotchas

It's not always enough to assume that "the financial people" are keeping a close eye on things. As a project leader, you should be able to read between the lines of a company's financial report to spot potential problems.

Cut Storage Costs with Selective Outsourcing

Outsourcing is suddenly fashionable again as business managers, confronting lean economic times, take another hard look at what is and isn't a "core competency."

Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.