New reportreveals that 42 percent of businesses surveyed don't know how many orphaned accounts they have, and over one-fourth don't have procedures to locate or turn off orphaned accounts
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Lively panel discussion on the future of dynamic scripting languages held at JavaOne conference
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Free online fixes problems for users with AMD-based systems
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Ninety percent of the illicit Web sites using spam to generate traffic are clustered on only 2.5 percent of the registrars accredited by the Internet Corporation for Assigned Names and Numbers, making the spam problem seem almost manageable.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    You can implement data warehouse solutions on a small budget by focusing on system, database, ETL, and reporting technologies that work in concert with requirements gathering, development, testing, and training. In the second part of our series, we look at how to keep human/personnel costs low.
                    
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    Anti-virus maker PC Tools says Vista is more vulnerable to malware and other exploits
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    ETI touts is own unique spin on data integration: precompiled data integration executables. It's one of several key differentiators for the veteran competitor.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The Oracle In-Memory Database Cache keeps frequently accessed data in memory for faster performance.  We look at the strengths, weaknesses, opportunities, and threats of this technology.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With BI powerhouses IBM, Oracle, and SAP nipping at its heels, SAS improves usability, readies new language converter
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft rolls out prerelease versions of its solutions for  small-to-medium businesses
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Risks, rewards, and best practices
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Social engineering ploy tricks computer users into divulging personal information that cybercriminals use to bilk unwary taxpayers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft is investigating the matter, but the bug seems to  derive from bad installs by OEMs on AMD-based computers
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It may not be long before businesses differentiate themselves on the basis of security
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Company confirms plans to acquire outsourcing services provider
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Despite Sun’s poor economic showing recently, the atmosphere at last week’s JavaOne conference was surprisingly festive
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    You can't do everything.  Here's how to make your project a success.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    'What mainframe shop doesn't have business rules? In an age of draconian compliance and governance, the case for rules is stronger still. You can, however, benefit by implementing a BRMS.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A new report by The Hackett Group can guide IT to make strategic cuts that reduce costs without seriously compromising service delivery