Instant decision-making on high-volume, high-velocity data streams isn't a new challenge. We examine seven principles to help manage RFID data.
SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk
IBM releases two new and three updated CICS tools
CIOs talk up employee retention strategies; the return of travel, training, and table tennis
Adaptec and SNAP have found each other—and that bodes well for all of us
New modules in the Linux 2.6 kernel make for easier host-based application security.
Verifying PC security compliance before granting network access
A merger marked by complementary products that work synergistically—we talk with Business Objects about their acquisition
IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities
Users say they’re mostly satisfied with the six-month-old version 1.0 product—although almost all have a pet peeve or two they’d like Microsoft to fix
New data warehousing bundle taps IBM’s DB2 database, MicroStrategy’s BI platform
To gain control of data and systems, IT consolidated their environment. A better solution is emerging: optimization tools.
How IT organizations are spending their budgets
Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries
SCO’s day in court almost couldn’t have gone much worse; company says it's only a minor setback
Is there a role for the independent integrator in the well-demarcated world of storage vendor relationships?
Finally there's software to let enterprises remove spyware.
New data monitoring component to assist validation, compliance efforts
Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser
New data extraction tool boasts .NET underpinnings, OLE DB, RSS support