Features & News


TDWI Audio Report: BI’s Hot, But Useful Tools Not in Place

In a recent survey, more than 63 percent of IT professionals said business intelligence tools are important to their operations.

Podcast: An Introduction to Application Virtualization

Hardware virtualization has one major drawback: your applications must run on the virtual machines you’ve defined. Imagine assigning virtual machines to applications as needed so they can always run at their best.

Three Resolutions for Storage 2008 (Part 2 of 2)

Why storage pros should focus on resiliency, manageability, and their "junk" drawer

Is Green IT Falling Drastically Short?

Why the current crop of Green IT initiatives isn't green enough

Oracle Databases Go Unpatched, Survey Finds

Most IT personnel have not applied critical security patches

Reality Check: A Closer Look at System z's Late-2007 Stumble

Were System z's third-quarter shortfalls an aberration or a harbinger of a rough year ahead?

Bacn: Better than Spam but Still Clogging Inboxes

Classifying all messages as either spam or ham leaves a gaping hole that breeds confusion across the enterprise. Enter bacn.



Why Securing Mobile Devices Keeps CIOs Up at Night

With mobile security, the devil you don’t know can hurt you much more than the devil you think you know

Issues and Techniques in Text Analytics Implementation, Part 1 of 2

How to streamline the information extraction process

DW Appliances: Kognitio to Debut in U.S., Netezza to Scale into the Stratosphere

There's plenty of action afoot in the teeming data warehouse appliance market

Why It's Time to Get Serious About Enterprise Content Management

IBM pushes ECM as a complement to bread-and-butter data warehousing

Study: MSN Most Dangerous IM Client in 2007

MSN Messenger was the instant messaging client of choice for hackers, thieves and many types of malware in 2007

Three Resolutions for Storage 2008 (Part 1 of 2)

Why relationship selling must stop

A Primer on Desktop Virtualization Using Thin Clients and Blade PCs

We explain the four major models of remote client solutions on the market today.

IM Security Exploits Explode in 2007

It's time to finally get serious about locking down IM

Big Blue Showcases Big Iron Solaris

Solaris running on the mainframe? It's far from a pipedream.

Protecting Your Enterprise from the Thriving Cyber Underground

Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.

Microsoft's Virtualization Strategy Coming Into Focus

Will Microsoft's server virtualization push change the rules of the game?

First Look: Project Zero

Web developers who want to avoid writing Java applets may like this Eclipse plug-in tool

Trojans 2 Crimeware Exploits Web 2.0 Technologies

A new exploit tries to obscure data transfers via RSS feeds and more