News

Database software

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • August 24, 2006 24 Aug'06

    How do I establish recovery priority for my applications?

    If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the applications because they don't really know where the data is. If we talk today about virtualization...

  • August 01, 2006 01 Aug'06

    Litchfield: Database security is 'IT's biggest problem'

    At Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious files, gain DBA-level privileges and access sensitive data.

  • July 28, 2004 28 Jul'04

    Automated SQL injection: What your enterprise needs to know

    The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk.