Caution in IT hiring plans
Strong, effective IT security can be compromised by orphaned accounts and entitlements. We offer strategies to manage these expired accounts and entitlements.
Also notes slow market adoption of Vista
New Forrester study paints a picture of a BI landscape that remains diverse, thriving, and maturing.
ERP often doesn’t deliver. We explore why and offer possible solutions.
New version causes licenses to expire on patched machines
If your BI project needs more resources -- from processing power to storage space -- cloud computing may just be what you need.
It’s essential that IT understand the impact on network resources and application delivery of any and all anomalies in network behavior. Anomaly detection tools can help.
With focuses on SOA, virtualization, next-generation data centers, and cloud computing, Summer SHARE will likely have plenty to interest attendees.
Specific announcements unclear; event includes discussion about Microsoft Application Virtualization
It's time to take another look at remote storage services.
SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker
Almost all IT shops say that boosting energy efficiency is a clear priority, but comparatively few are actually spending money to do it
Alliance will help VMware further its collaboration with Linux community
Hackers alleged to have accessed more than 40 million credit and debit card numbers
Big Blue introduces new products, services, and initiatives to expand its commitment to Linux, open source
Company announces new approach to security notification
Why it’s so difficult to get value from your ERP system -- and what you can do
DM pros might not have much interest in hardware, but -- like it or not -- hardware plays an important role in BI and DW performance and budgets
What, exactly, is a data warehousing appliance: hardware, software, or a combination of the two?