With PerformancePoint, Microsoft has a plausible reason to crow.
For SME firms with limited IT know-how, BI is an especially tough nut to crack. It’s a nut BI players of every stripe desperately want to crack, however.
Oracle this week announced its first rev of ODI, along with an updated version of the Oracle Secure Enterprise Search tool it announced a year ago.
Some industry watchers think Big Blue’s midrange workhorse might have finally turned a corner
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
What's on SPI Labs' list of top Web application security threats it expects this year?
Development efforts are growing, and they’re finishing on time, new research says
Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.
Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits
The five-year run-up to Windows Vista culminated with the official consumer general availability of Vista and Microsoft Office 2007.
Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.
A new exploit potentially lets an attacker execute code on a user’s machine
Call it a fashionably late, but nevertheless feature-complete arrival.
The revamped BI Suite incorporates analytic technology from the former Siebel Systems Inc., which Oracle acquired 16 months ago.
We explore new research with the author of “My Life is Failure -- 100 Things You Should Know to be a Successful Project Leader” so you can learn from the mistakes of others.
Web 2.0 technology is helping firms bring applications to market faster than ever.
If you haven’t yet heard of SaaS BI startup Xactly, consider yourself duly informed.
After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?
PGP Corporation may have the handle on protecting sensitive data everywhere
How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.