020819feintro_a.gif

Security Part I: Strategies

Impenetrable defenses is a costly, illusory objective, so securing your enterprise should strike a balance between protecting corporate assets and breaking the bank A MARTIAL ARTS teacher tells students, “You’re going to get hit.” They learn that although being hit…

Sniffing for sneaks

SourceFire speeds installation, but setup and tuning take sweet time See correction below ONE OF THE major problems with incorporating intrusion detection is that it’s a complex, difficult process. Even if you’re using an open-source product such as Snort (…

Game over

McNealy’s on a roll with Linux, picking up free games at the expense of IBM, Microsoft, and Dell SUN CHIEF SCOTT MCNEALY is having fun again. No, I don’t mean the Microsoft-bashing and golf-major jokes. “They sell newspapers for you…

Rescue, Linux style

If preserving valuable data is a priority, these tools are worth checking out BACK IN JUNE, I wrote a column about the problems inherent with the ubiquitous Windows rescue CDs that seem to come with most name-brand PCs these days…

The big MMS picture

Emerging Multimedia Messaging Service is a stalking horse for deeper issues CURRENTLY, USERS HAVE a choice of e-mail, IM, and SMS (Short Messaging Service) on cell phones and some converged devices. Now, the industry, or most of it, is gearing…

Trading on the edge

Enron’s story serves as a warning — good technology can’t fix bad business IN THEIR DRIVE TO TAKE Houston-based Enron from a sleepy, regional gas pipeline company to a billion-dollar energy provider, Enron executives knew they needed the best in…

Mail policies made simple, seamless

Omniva effectively enforces retention policies without disrupting existing infrastructure ANYONE IN BUSINESS will confirm that it’s one thing to create a policy and entirely another thing to enforce it. This is especially true when it comes to e-mail. Most enterprises…

020819opadviser.gif

Mapping the integration universe

Use a message broker and Web services to rethink your approach to application and systems integration As we pass through new periods of information technology, we carry forward application artifacts from previous periods with us. Depending on the age of…

020816hnpulaski.gif

BindView simplifies security

CEO Eric Pulaski argues the need to reduce the complexities and cost of managing security WITH THE ADVENT of Web services, vendors that specialize in security are being asked to rise to new heights in terms of capabilities and performance.…

Product Snapshot: Tifosi 2002

Tifosi 2002 leverages a component model to integrate enterprise applications August 16, 2002 — In early August, Fiorano Software released Tifosi 2002, a peer-to-peer services integration platform that builds, deploys, modifies, and debugs business processes. The platform includes Tifosi Peer…