September 1, 2006

Encryption fuels security trends

Decryption key is central to controlled rights and self-deleting data

September 1, 2006

Keep data confidential -- or else

Plenty of statutes on the books protect data, but those involving encryption don’t offer prescriptive guidance

August 31, 2006

Enterprise DRM products protect documents from prying eyes

Liquid Machines, SealedMedia secure enterprise perimeter by controlling document access, compliance

August 28, 2006

Streamlining the ultimate supply chain

U.S. Transportation Command has launched a campaign to revitalize its IT with an ambitious SOA implementation

August 28, 2006

Waging war on the bottom line

Faced with new economic realities, the Department of Defense must rethink how it budgets for IT

August 21, 2006

Lessons from the verticals

InfoWorld takes a hard look at five industries and highlights innovative solutions to IT's toughest problems

August 21, 2006

Telecommunications: Grappling with M&A mania

How many plates can you spin? Try merging huge IT infrastructures with mishmashes of legacy systems while trying to beat the competition with new services

August 21, 2006

Financial services: High pressure, high performance

In financial services, slight slowdowns in transaction volume can equal big losses. No wonder IT invests big in new technology -- while keeping regulatory wolves at bay

August 21, 2006

Government: Unlocking data, locking down access

The federal government is on a mission to expose content from legacy systems in portals, but it also must meet stringent new access control regulations

August 14, 2006

Inside IBM DB2 Viper

A technological marvel, IBM's new XML-powered server aims to change the face of database storage

©1994-2014 Infoworld, Inc.