BIRT is enabled in part by technology expertise from reporting stalwart Actuate, which released a branded version of the tool
Forget ETL: metaController enables a new kind of integration, which Traverse officials describe as “process orchestration”
For the first time, factory revenues for Unix and Windows servers were equal
IBM’s flagship xSeries server demonstrates how far Intel servers still have to go to reach feature and function parity
For the first time in years, Sun looks like the cagey, competitive, and iconoclastic competitor of old
New tools previously unavailable on mainframes can now enable native, simplified, cost-effective data integration with increased reliability, scalability and performance.
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
Is enterprise content management the next new panacea?
The differences between signature-based, access control, and intrusion prevention products
XML and Web services make SQL Server a more interoperable player for BI; both are seen as mixed blessings by IT pros, too.
While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.
Gartner’s most recent RDBMS market share figures amount to a vindication of sorts for the business intelligence industry; Teradata’s revenues surge by more than 17 percent
CRM kingpin Siebel continues to struggle even as scrappy newcomer Salesforce.com enjoys surprising success.
Some suggest that BRM is just a crazy notion in a technology utopia
BMC’s new Performance Manager combines elements of Patrol classic and Patrol Express and features a single license.
Reliable, high-quality software can be yours if you incorporate these three principles into your development
Tape … disk … tape … disk! Round and round we go.
PMML recasts the data warehouse as a turnkey platform for real-time data mining.
Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index
A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.