News

News

  • May 25, 2006 25 May'06

    Spammers hijack authentication mechanisms to send malware

    Content filtering provider AppRiver reports an attack gaining momentum by using trusted systems to push malware before anyone notices.

  • May 24, 2006 24 May'06

    Email archiving: What's right for your enterprise?

    There is a growing need to archive email data, and today there are several ways to do it. Stop to consider what would work best for your enterprise.There is a growing need to archive email data, and today there are several ways to do it. Stop to ...

  • May 22, 2006 22 May'06

    Email archiving: Should storage pros keep everything?

    From conniving lawyers to dodgy tape practices, here are some of the juicy tidbits we heard on the show floor and during sessions at Storage Decisions.

  • May 18, 2006 18 May'06

    BlackBerry extends mobile applications without e-mail

    BlackBerry maker Research In Motion Ltd. has a new server that pushes out MDS applications independently of e-mail.

  • May 17, 2006 17 May'06

    With Microsoft's Atlas toolkit, no wait for Ajax controls

    With two releases in the last month, the Atlas Control Toolkit is giving developers Ajax controls for ASP.NET apps long before Atlas is due for release. Soon developers will be able to submit their own controls as well.

  • Sponsored News

    • Why Choose the IBM Cloud for Your SAP Workloads

      Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More

    • How To Teach An Old Application New Tricks Via Cloud-Native Technologies

      Every enterprise has dozens, hundreds, or even thousands of applications developed through traditional methodologies. Whether those applications were created by internal developers or purchased off the shelf from software publishers, it’s highly likely they were built and deployed using tools and processes that have been around for years. See More

    • Leveraging The Cloud is Key To Strengthening SAP Disaster Recovery and Business Continuity

      Enterprise IT teams must do everything in their power to minimize downtime of business-critical SAP applications and ensure they can recover quickly, reliably and securely in the event of a disaster or other emergency. With enterprises fully embracing digital transformation, big data analytics, the Internet of Things and other innovations, they are more dependent than ever on the availability of their SAP environments. See More

    • Where to Start Your Cloud-Native Journey

      If you’ve committed your organization to cloud-native application development, you’re in good company. Research indicates organizations that take an aggressive pace in adopting cloud-native development are more likely than their less-ambitious peers to report higher revenues. As a result, more and more development efforts are now being envisioned and engineered to be cloud-native from the start, and many of those programs represent an organization’s first foray into the cloud-native development process. See More

    View All Sponsored News
  • May 15, 2006 15 May'06

    Symantec taps Dell to fix e-mail archiving support

    Admitting that its support for Enterprise Vault has been a problem, Symantec plans to lean on Dell to sell and support the software worldwide.

  • May 09, 2006 09 May'06

    Mobile device trends: Security, consolidation and more

    In a recent report, J.Gold Associates outlined the direction in which mobile devices will be heading in 2007 and 2008. Security is high on the list, while other trends such as consolidation and multi-modal user interfaces start generating some real ...

  • April 26, 2006 26 Apr'06

    Virus onslaught sickens smartphones

    Mobile viruses are still somewhat of an unknown. They're out there, but they've only just begun. What are they, what do they do, and what can you do for protection?

  • April 21, 2006 21 Apr'06

    Study: SOX-compliant firms see drop in costs in year 2

    According to a new report, companies following Section 404 of the Sarbanes-Oxley Act will see a decline in compliance costs in their second year. However, experts say IT spending on SOX compliance in general will continue to grow.

  • April 21, 2006 21 Apr'06

    Research shows smarter phishing

    Recent threat reports all suggest a steady increase in the aggressiveness and sophistication of phishing attacks, and bank customers are still a top target.

  • April 19, 2006 19 Apr'06

    What the new Office means for developers

    Visual Studio Tools for Office lets developers customize Office documents and applications. Once Office 2007 comes out, the UI Ribbon can get a new look, too.

  • April 18, 2006 18 Apr'06

    Report: IM, P2P threats on the rise

    Research shows a steady increase in threats that target unauthorized IM and peer-to-peer applications. Worse yet, most IT departments have no way of knowing the threats exist.

  • April 18, 2006 18 Apr'06

    Law firm picks Palm Treos over BlackBerry 'pancakes'

    A Houston law firm wanted devices that could do it all but were also nice and compact. After rigorous testing, the firm chose Palm Treo smartphones over BlackBerrys.

  • March 30, 2006 30 Mar'06

    Special Report: How much is that SOA in the window?, part 1

    The confluence of two major movements in the software industry is promising to cause a change in how vendors make money on technology, and how customers spend money on technology.

  • March 29, 2006 29 Mar'06

    Java developers can't afford to ignore app security

    For many Java developers, application security has not been an issue they've wanted to address. That changed last week as a panel of application security experts tackled the subject at TheServerSide Java Symposium in Las Vegas. The panel's message ...

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

SearchContentManagement

Close