Linux-powered databases post strong showings in price and performance benchmarks
The ARM standard is designed to help simplify transaction performance monitoring for Web applications
There is no single software solution that will solve all the Sarbanes-Oxley regulation requirements, but supply chain management solutions can help.
Important announcements from Hitachi Data Systems and Computer Associates may look similar from 50,000 feet, but on closer inspection they're quite different.
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
New offering supports relational and non-relational data stores, distributed and mainframe computing platforms
By aligning with middleware-rich IBM, PeopleSoft can talk up a strategy of its own to counter SAP’s NetWeaver and Siebel’s UAN initiatives
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
Banks help ID thieves; unified security appliances; server security
There’s a problem with scorecarding, balanced or otherwise: No one knows if it actually works.
New product exploits scorecard analytics to present information in a way that’s intelligible to executive decision-makers.
Sun may be on a comeback, but its inability to articulate a Linux vision that’s all things to all people could continue to dog it
Successful data integration can mean the difference between a company that realizes its full potential and one that just keeps missing the mark. We present an overview of what’s involved to successfully cleanse and integrate data on disparate systems in multiple locations.
The latest SmartDBA tool lets DBAs manage IMS from the same console they use for Oracle or DB2
A Computer Associates vice president for marketing of BrightStor products suggests storage management today is a child still in the throes of personality development.
For data quality vendors, it’s not enough anymore to do name and address validation
Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
The ETL mid-market is in play, and Ascential, Informatica, and other vendors are taking notice
Essbase gets its second coming-out party, and a new name, in nearly as many months