Software


SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

FairCom’s Updated c-treeACE Bridges SQL, NoSQL

Developers can map non-relational data as relational (SQL) without modifying the data.

Dell Introduces User and Device Management Cloud Service

Dell Wyse Cloud Client Manager provides a single point of administration across end-user service scenarios without the need for on-premise management hardware or software.

IT Governance Toolkit Helps Organizations Meet Business Continuity Requirements

Solution includes templates for policies and procedures, offers PDCA guidance, and includes an implementation checklist to assist enterprises in meeting ISO22301 best practices.

Content Matrix 6.0 Helps IT Upgrade, Migrate, and Organize SharePoint Content

Combines fast upgrade and migration speeds with content organization tools for improved knowledge sharing and collaboration with SharePoint 2013.

Updated Decathlon DCIM Solution Optimizes Reliability, Energy Efficiency of IT Systems

Decathlon Version 2 provides accurate, fine-grained visibility into device and system performance, expert decision support, and secure control technologies.

Micro Focus Introduces Free Integrated Development Environment for IBM Mainframe Application Modernization

Entry-level version of Micro Focus Enterprise Developer offers a choice of Eclipse or Visual Studio IDE to develop enterprise-class mainframe and distributed applications.



SuperLumin Networks Releases Nemesis 2.4

OS updated to SLES 11 Service Pack 2.

From Users to IT -- How Tableau Broadens Its Appeal

Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.

Why Climbing onto the Cloud Just Makes Sense

We examine the three characteristics any cloud infrastructure should have.

Q&A: Application Performance Management in Action (Case Study)

When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.

Reports of E-mail's Death Greatly Exaggerated

E-mail isn't dead. In fact, it's more alive and robust than it has ever been.

Best Practices for Creating an Effective Business Continuity Plan

Your business continuity plan must focus on three elements: people, infrastructure, and processes.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

STORServer Releases New Entry-Level Backup Appliances

Company also updates existing model lines with larger daily change rates.

BlueStripe Transaction Monitor Tracks Individual Transactions without Code Changes, APIs, or Network Appliances

FactFinder v7 with TransactionLink technology ties together transactions, applications, and the infrastructure automatically. BlueStripe Software

Spectra Logic Expands Enterprise-level Encryption Key Management Portfolio

Spectra TKLM provides centralized encryption key management for multiple libraries.

ManageEngine’s Applications Manager Monitors Web Sites from User Locations

Site24x7 integration enables monitoring from inside, outside data center.

How to Use the New Analytic Functions in SQL Server 2012

Learn how the new functions that perform calculations on ordered data sets in this excerpt from "Murach's SQL Server 2012 for Developers."

Porticor’s Updated Security System Provides Full Trust, Confidentiality of Cloud Data

Homomorphic key encryption technology keeps master encryption keys fully encrypted and secured even while being used to access cloud data.