Spotlight Reports


Minimizing Information Risks for Business Messaging
Attacks on business messaging systems are becoming increasingly malicious and often criminal, forcing ...


Comparing Email Management Systems that Protect Against Spam, Viruses, Malware and Phishing Attacks
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email ...


Avoiding Legal Traps on the Web
One of the chief concerns for IT professionals tasked with protecting network assets should be the legal ...


RFID: A Business Revolution Providing Strategic and Competitive Advantage
RFID technology has been in use for many years, but is now finding a mass-market application in supply ...


Latest Reports

WHITEPAPER
Data Protection for SMBs: Beyond Tape Backup
04.20.07 As more employees work from remote locations, the risks and potential costs of data loss are too great. And the price of failure keeps growing, as more ...
by Arsenal Digital
CASE-STUDY
Success Apparel Success Story
04.19.07 Before moving to a new corporate location, Success Apparel sought a new and reliable infrastructure to accommodate a smaller data center. Moving from
by Novell


WHITEPAPER
SUSE Linux Enterprise 10 in Manufacturing
04.19.07 Drivers such as the Internet boom, Y2K, the growth of enterprise resource planning (ERP) and the lack of wide-area networks (WANs) led to decentralized ...
by Novell
CASE-STUDY
Siemens IT Solutions and Services Success Story
04.19.07 Siemens IT Solutions and Services supports the SAP* systems for Siemens AG, one of the largest SAP customers in the world, as well as a variety of outside ...
by Novell


CASE-STUDY
Hines Corporation Success Story
04.19.07 In the competitive manufacturing industry, companies are continually looking for ways to reduce overall costs. Hines Corporation modernized its IT infrastructure ...
by Novell
WEBCAST
Managing Change Risk on Critical Windows NT Infrastructure
04.17.07 Many organizations still have critical Windows NT systems within their IT infrastructure. These systems often support fragile legacy applications and
by Solidcore


WHITEPAPER
How Good are the Support Services for Your Company's Servers?
04.17.07 Are you putting your company's information technology (IT) environment at risk without knowing it? Chances are, if you've begun to rely on industry-standard ...
by Hewlett-Packard Company
MISCELLANEOUS
Information Empowers- Give Your Business the Power of Choice
04.16.07 As the world’s largest enterprise software company, Oracle has spent years learning how enterprises work. They’re complex; each one faces
by Oracle


WEBCAST
Secure Network from Internal Threats
04.13.07 View on-demand webcast to learn how to secure your network from internal threats. This webcast outlines causes and explains how having the right tool ...
by Fluke Networks
WEBCAST
Solving Network Problems
04.13.07 View on-demand webcast to learn how to quickly identify and solve network problems using a portable network analyzer. This webcast will cover the various ...
by Fluke Networks


More Reports



Computer World CIO IDC PC World CSO Mac World IDG

Network World Info World Linux World Java World

Home | Advertise | Contact Us

Copyright © 2006, IDG Connect, All rights reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the IDG Connect Terms and Conditions and Privacy Policy