Features & News


Silver Creek Accelerates Product Data Integration

Existing DI and DQ tools can't easily be adapted to address product data integration. What's needed, proponents say, is a better, dedicated tool.

Zero-Day IE 7 Flaw Discovered

Bug exploits XML tag

QlikView's Rapid Time-to-Implementation Improves BI Value

QlikTech believes its QlikView product will benefit disproportionately from a projected surge in BI spending

Q&A: Integrating Content Management and BI

Integrating BI, content management, and portals has long been a challenge for IT. Open source has a price advantage, but is it right for you?

Q&A: From Part-time to Prime-time: BI Evolution Continues

A look at the trends that left their mark in 2008, plus what's ahead in 2009.

Survey Highlights Threats from Disgruntled Employees

Employees who believe they may be fired may steal proprietary information to blackmail management

Storage 2008: Promises Delivered and Postponed, Part 2

Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.



Enterprise Open Source Thrives

Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.

Outsourcing and Employee Retention

How the right software development partner can help to retain your in-house IT team

Trusted Storage for Enterprise-class Hard Disk Drives, Part 2 of 2

Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.

Cloud Computing, Big Iron-Style

Mainframe pros have joined with IBM to tout the virtues of Big Iron-based cloud computing.

First Look: Fedora 10 OS

New release features good functionality plus a pleasant user interface

Linux-Based VDI a Reality

IBM partnership will allow Ubuntu to be used in desktop virtualization architecture

The Value of BI in a Weak Economy

When times are tight, BI can actually save you money.

BPM and Beyond: The Human Factor of Process Management

How Best-in-Class companies make the most of BPM

Survey Focuses on Security Deficiencies at Small and Midsize Business

Guest access, mobile users, out-of-date software protection highlighted

IDC Report: Dominant DW Vendors Face Challengers

A new study from IDC shows that which companies continue to dominate the data warehousing market and which are enjoying surging growth

Selling BI by the Slice

Mid-market shoppers at the recent Sage Summit Customer Conference wanted to try BI by the slice, and many didn't even call it BI. Vendors' pitches kept that in mind.

Securing Your Enterprise with a Many-to-Many Software Deployment Model

How deploying hardware in the data center that runs a centralized security suite that handles multiple security configurations can protect a diverse set of end users.