Latest articles for CIO magazine

Deception technology grows and evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…

Why Linux is a desktop flop

Why Linux is a desktop flop

It’s free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than  Windows. It’s already…

Vendors Releasing Same Software on Parallel Tracks

Dual software releases–one open-source and one commercial–can mean savings and security for buyers.

Five 3D virtual environments for the enterprise

Several companies are offering business-friendly virtual meeting platforms that work right in a Web browser, no software download required, with prices starting at around $50…

Companies Explore Private Virtual Worlds

Companies Explore Private Virtual Worlds

Alternatives to Second Life provide security while boosting productivity Meetings, conferences and training programs in a 3D virtual world such as Second Life can be…

iPads storm the enterprise

Apple’s new application-level encryption paves the way for companies to run business apps on the iPad

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks,…

OppenheimerFunds Gets Return on Investment from Agile and SOA

OppenheimerFunds Gets Return on Investment from Agile and SOA

OppenheimerFunds used to have a data entry efficiency problem. Address changes that customers made on its website had to be manually re-entered into a variety…

Open Source – China’s Bet on Linux

Open Source – China’s Bet on Linux

As China prepares to become a full member of the World Trade Organization, the Beijing government is trying to prove to the West that it…