Features & News


Cloud Computing To Bring Security App Shift, Report Says

Revenues for hosted security apps are expected to triple over the next five years

ISO/IEC Officials Allegedly Advise Rejecting OOXML Appeals

Microsoft's Office Open XML (OOXML) document format may survive an appeal

Business Smarts Trump Book Smarts in Project Management, Gartner Says

Visionary companies will push project and portfolio management from the top down to develop basic management skills at all levels

Windows DNS Patch Strands ZoneAlarm Users

Microsoft officials warn of a problem that arises after users apply a DNS patch to Windows XP and 2000.

Compliance, New Threats Drive Security Spending

Enterprise security is an expensive proposition – one that's likely to get even more expensive as organizations take steps to protect themselves.

Careers: Have Talent, Will Travel

With leading economic indicators sagging, you'd think the hiring outlook would be similarly bleak. Strangely enough, it may not be

Being an IT Hero

Too many IT shops are deploying supposed technology solutions without fully understanding the complexity and collateral effects introduced into other parts of a dynamic system.



Virtualization: Five Key Decisions You Must Make

You can increase your chances of success by answering these five questions early in your virtualization project.

Microsoft Says SQL Server 2008 To Ship This Quarter

SQL Server 2008 will be released to manufacturing by the end of this quarter, which ends on September 30

Uncorking the Data Bottleneck with Operational BI

Lessons from Web search and Web 2.0

SWOT Analysis: Business Objects' Predictive Workbench

We look at the strengths, weaknesses, opportunities, and threats of Business Objects' Predictive Workbench.

In Depth: Closing the Ad Hoc Query Performance Gap for Good

Poor ad hoc query performance was the motivating reason behind the rise of data warehousing in the late 1990s -- and it's still a problem today.

Modernization with a Twist: Keeping an Organization’s DNA Intact

Could replacing core systems cause an organization’s identity to unravel?

Mapping the Human Genome was the Easy Part

How to store and manage all of the data created in the genotyping process and in subsequent analytical activities creates unique requirements for research scientists.

Is Cloud Computing the Next Disruptive Technology?

We could be on the cusp of another revolution: a c-business paradigm shift, driven by cloud computing.

Firefox's Auto-Update is Model for Safer Browsing, Report Concludes

As attackers increasingly target browser flaws, the Firefox update scheme serves as a model for the industry

Microsoft Mends Breach in Open Source Sandcastle

Company has released all of the source code used in its Sandcastle project

Citibank Hack Shines Light on PCI Compliance

Details emerge of elaborate plot to hack Citibank's ATM network architecture

Tougher Security Planned for Internet Explorer 8

Microsoft promises "comprehensive protection"