IBM has released two new blogging tools with features geared to the enterprise.
Much discussion about IT security centers around the idea that developers should build secure applications. It makes sense; more than ever, attackers are targeting vulnerabilities in the application layer. But in an increasingly service-oriented world, in which monolithic applications are being broken down into smaller pieces for reuse, is it practical to expect developers to code security into individual Web services?
Panacya recently released BoxTone 2.0, which features end-to-end visibility into several e-mail environments, including Microsoft Outlook and Exchange, and BlackBerry, the company says. It builds models of complex e-mail flows, including SMTP, Outlook and Exchange, Exchange-to-Exchange and BlackBerry, within an enterprise and across external service providers.
Hitachi Data Systems recently introduced a midrange storage array with storage
virtualization features for small and mid-size customers seeking more capacity
but lacking the required staff and data center infrastructure.
Microsoft is set to ship its first disk-based continuous data backup and recovery solution. The System Center Data Protection Manager (DPM) is designed to back up data on Windows file servers and network-attached storage (NAS) devices as a series of up to 64 snapshots.
With internal auditors breathing down their necks over compliance and security issues, many large companies are eager for help organizing IT operations infrastructure. That helps explain the mushrooming popularity of the Information Technology Infrastructure Library.
With internal auditors breathing down their necks over compliance and security issues, many large companies are eager for help organizing IT operations infrastructure. That helps explain the mushrooming popularity of the Information Technology Infrastructure Library.
The Apache Software Foundation's (ASF) open-source J2EE application server project, Geronimo, has cleared a significant hurdle on its way to full J2EE certification: successful completion of Sun Microsystem's J2EE test compatibility kit 1.4.1.
Java users are more likely to use open-source software than non-Java users, according to research by Evans Data Corporation.
Visual Numerics is targeting financial, business intelligence, bioinformatics and life sciences companies that are seeking a framework for tailored analytical applications. The company recently introduced JMSL Numerical Library 3.0, a Java numerical analysis package for Java programmers.
UNICCO Services Company is widely known as a leading provider of facilities services. Its customers come to the operation to outsource everything from janitorial services and landscaping to production support, lighting and administrative/office services. Information technology innovations are, says the company's VP of IT Jeff Peterson, the last thing on their minds.
Finding and solving performance problems isn’t easy for IT staffers. But what if some of those problems were caused by IT’s lack of communication? ShopNBC.com recently dealt with such issues to improve its customers’ experiences.
UC4 Software recently released software to help companies monitor enterprise job scheduling and data center automation in complex environments.
Backbone Media, an Internet marketing consulting firm, has released the results of its 2005 corporate blogging survey and a series of case studies. The blogging survey sought to understand what results business bloggers have received from their blogs.
Earlier this week, Microsoft took the wraps off its upcoming CRM 3.0 suite, which includes several new features and the opportunity for customers to choose between on-site licensing or subscription-based licensing for customers that prefer a hosted offering.
There's a deafening buzz in service-oriented architecture around repositories,
which appear to be emerging as a core component of SOA. What is actually emerging,
says Miko Matsumura, is an integrated registry-repository model, which could
serve as the core technology of what amounts to an SOA platform.
Hardware-based two-factor authentication has been around for about two decades, but interest in sign-on solutions that require something you know (your password) and something you have (a hardware token) has recently gotten some serious gotten mass-market attention.
The biggest challenge today’s IT organizations face isn’t selecting the right technologies—it’s finding skilled developers to perform complex, multi-platform integration tasks, often involving legacy systems. That need, in turn, is helping drive the outsourcing of application development.
Caseworkers for the State of Wisconsin needed to access their records, but it was hard to do with the state’s IT infrastructure. Wisconsin operates more than 30 agencies whose staff accesses applications and critical information on about 5.5 million Wisconsin residents that is housed on mainframes and servers.
Oracle Corporation and Sun Microsystems will serve as co-specification leads for the Enterprise JavaBeans 3.0 spec, the two companies announced last week (6/29).