What is compliance?
These days, compliance is a high priority for organisations as there are some severe penalties for failing to adhere to the correct procedure. Fortunately, there are ways in which the process can be automated.
Transforming regulatory mandates into business drivers
Faced with a bewildering array of compliance demands, companies have been atempting to handle their applications in a piecemeal way. However, companies that adopt a more holistic approach will benefit in many different ways
Change and flexibility
This report looks at change management - how business change affects IT, and how the two can usefully be brought together.
Mixed Workload Consolidation Guide
Provides help to identify appropriate applications for mixed workload consolidation, validate compatibility of applications, and plan for a mixed workload consolidation deployment.
How to automate your 64-bit migration - part 1
In the first of our two-part series on code migration, MigraTEC, maker of 32-to-64-bit migration tools, explains the issues and complexities involved in 32-to-64-bit porting.
The case for e-mail security
E-mail poses areas of risk that threaten corporate integrity. A white paper from MessageLabs discussing email security.
Creating Web Services using Novell exteNd and NetWare 6.5
This white paper describes the tools and technologies included with NetWare 6.5 and summarises other Novell exteNd technologies available for developing, deploying and hosting Web services applications.
Introduction to database worms
In recent years, databases have joined web servers and operating systems as a means of attacking a company's infrastructure. This is now a vulnerability that needs to be addressed.
Protecting Oracle databases
The frequency of attacks on Oracle databases have increased in recent times. This white paper gives an overview of the security threats to watch for and discusses methods of protection.