In a recent survey, more than 63 percent of IT professionals said business intelligence tools are important to their operations.
Hardware virtualization has one major drawback: your applications must run on the virtual machines you’ve defined. Imagine assigning virtual machines to applications as needed so they can always run at their best.
Why storage pros should focus on resiliency, manageability, and their "junk" drawer
Why the current crop of Green IT initiatives isn't green enough
Most IT personnel have not applied critical security patches
Were System z's third-quarter shortfalls an aberration or a harbinger of a rough year ahead?
Classifying all messages as either spam or ham leaves a gaping hole that breeds confusion across the enterprise. Enter bacn.
With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
How to streamline the information extraction process
There's plenty of action afoot in the teeming data warehouse appliance market
IBM pushes ECM as a complement to bread-and-butter data warehousing
MSN Messenger was the instant messaging client of choice for hackers, thieves and many types of malware in 2007
Why relationship selling must stop
We explain the four major models of remote client solutions on the market today.
It's time to finally get serious about locking down IM
Solaris running on the mainframe? It's far from a pipedream.
Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.
Will Microsoft's server virtualization push change the rules of the game?
Web developers who want to avoid writing Java applets may like this Eclipse plug-in tool
A new exploit tries to obscure data transfers via RSS feeds and more