Security Web Digest: Proposed Spyware Bill Requires Permission From Users
Arthur Tham
Privacy
Rep. Mary Bono introduced a bill…
Category: eWEEK
Storage Web Digest: PyX Stakes Claim to Error Recovery for iSCSI
Arthur Tham
Enterprise Storage
PyX Stakes Claim to Error Rec…
Web Presence Made Simple(r)
Anyone who wants a primer on how difficult it is for the lay person to effectively use technology should watch…
SQL Server Worm on the Loose
Lisa Vaas
A worm code-named “Voyager Alpha Force” that targets Microsoft Corp. SQL Server databases is …
Maxtor OneTouch Hard Disk to Push SMB Backup
David Morgenstern
Some external hard disk enclosures have gone high style over the past…
Forced Fit
Charles Babcock
It started as a small rebellion — A warning shot fired at the Windows monopoly by independent-minded pro…
How to Use Global Variables in SQL Server 2000 DTS
There are various ways of using global variables in Microsoft SQL Server 2000 DTS Desig…
CRM Strategies: Loyalty Programs That Are Working
Margaret L. Young and Marcia Stepanek
There are frequent-buyer programs, frequent-…
Can Technology Outpace a California Wildfire?
Larry Dignan
In October and early November, Ernylee Chamlee monitored fire officials m…
Testing Your Disaster Recovery Plan
Having a disaster recovery plan that covers alternative work space is one thing, but knowing that it w…