LANSA's Open for .NET solution is designed to help make integrating Microsoft applications and IBM data a trouble-free experience.
By Chris Smith
Ever roll into work and think you're actually in Gabon on the set of Survivor? Everyone has his little tribe, and no one thinks anyone else is contributing enough to justify their existence?
Think of the IBM i tribe as the red tribe, Fang. Think of the Microsoft .NET tribe as the yellow tribe, Kota. They wrestle, they compete, they try to survive on limited resources. If this describes your world, you may long for the good old days when there was but one tribe, the AS/400 tribe. Those days are over, however, so you might as well accept that there are now two tribes in Gabon. Do you want to compete, or do you want to get along?
Are you aware of the broad range of SaaS solutions, including enterprise solultions, available for SMBs?
by Ron Exler
Of all Software as a Service (SaaS) applications, collaboration is perhaps the most used yet least realized in enterprises of all sizes. Most organizations use online conferencing, such as Cisco WebEx or Citrix GoToMeeting. Many use instant messaging, such as AOL Instant Messenger. There is also growing use of online document collaboration tools, such as Microsoft SharePoint and Google Apps.
Gartner Group recently reported that it expects SaaS sales in enterprise application markets to surpass $6.4 billion in 2008. For collaboration SaaS, Gartner reported that it believes sales will exceed $2.1 billion in 2008 and $4.7 billion in 2012.
Ensure that your security events are being aggregated and included with other logs from your network.
By Brendan Patterson
In the wake of the SQL slammer worm in 2003, the attention of information security professionals was primarily focused on distributed computing architectures and Windows, UNIX, and Linux servers. Protecting the perimeter against worms and viruses was the order of the day. But today, meeting compliance initiatives and guarding against the insider threat from employees are just as important. Regulations specify the need for regular review and analysis of security logs. The Payment Card Industry (PCI) Data Security Standard, which was recently updated to version 1.2, requires that log files be reviewed daily and that at least three months of log data be available for immediate analysis.