IT organizations must come to terms with SOA’s much more rigorous planning, testing, and management requirements
What every storage admin must ask: what must we save and where shall we save it?
Does TIBCO’s acquisition of visualization specialist Spotfire Inc. portend a coming round of consolidations in the data viz space?
What makes HP think it can succeed where so many other vendors haven’t? A unique mix of software, services, and fault-tolerant servers, for starters.
iSuite boasts canned connectivity into heterogeneous data sources, which lets it support right-time reporting and analysis requirements.
Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.
As with everything else in IT, performance is a key consideration when selecting a backup solution. Finding a reliable measure, however, is problematic.
In our rush to adopt new technologies, we sometimes forget old disciplines that supported rigorous software development. Here are five rules that can help IT reduce the risk of failed SOA initiatives.
Why Compuware’s application-lifecycle toolset helps set it apart from competitors
Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.
How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.
The move will likely have mixed impact on most CA customers, although mainframe shops should expect some benefits
As pricepoints drop and knowledge about business intelligence and performance management spreads, has the information management industry reached a tipping point? Find out what Microsoft, Business Objects, Hyperion, LogiXML and InSolve have to say.
It’s a no-brainer: few of them actually have the strong top-down support that they need to be successful, Gartner claims
Business Objects picked up a best-of-breed PM provider and launched new versions of its ETL and EII tools last week.
In compliance, a focus on technical security can eclipse human factors. Particularly in IT compliance, a focus on technical security tends to eclipse human factors, with serious compliance implications. Good training programs need to be measured, controlled, and incorporate feedback loops so that the people responsible for the rulemaking getinput from the enforcers and (more importantly) from the employees who are subject to them.
End- user experience management is becoming an important component for ensuring the success of Web-based applications.
Can non-native archive management software improve the performance of the e-mail server by automatically archiving messages without user intervention?
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
Center will focus on SOA development, education