Features & News


Microsoft, Oracle Trade Salvos in the Battle of Linux

Both Microsoft and Oracle have now embraced Linux. What does that mean for you?

NAC Testing Options: Validating Endpoints and Their Health

In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices

A Closer Look: Network Appliance Clustering, Part 2

SANs are out, virtual grids (aka storage clusters) are in.

IBM Has Its Eyes on the SMB Prize

There’s gold in the SMB market, and IBM officials say they’ve made real gains in the lucrative space

Unified Threat Management: Think Beyond Appliances

UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.

Podcast: Outsourcing Security

From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so

Nearline Solutions: Reducing Data Storage Infrastructure Costs

Why a nearline component solution is the most practical and cost-effective way to keep data warehouse storage costs under control.



Data Trends Foreshadow DBA Challenges, MS SQL Server Direction

More unstructured data and an emphasis on business intelligence will keep DBAs busy

DataFlux Revamps DQ Suite

DataFlux 8 features new project acceleration and geocoding enhancements, along with bread-and-butter data profiling improvements

Imhoff Keynote: The First Word in BI Is ‘Business’

BI systems can work magic for decision-support, but only if someone on the business side sponsors them!

Business Objects Swings for the Fences

It’s been a busy fortnight for Business Objects, which previewed its next-gen BI suite and touted its new sales and marketing alliance with IBM.

Dashboards and Scorecards Hail Rise of Performance Management

An increasing number of organizations are tapping full-fledged PM tools—including performance scorecards and dashboards.

Podcast: Security Synergy

Merging IT and physical security can bring some exciting synergies to an enterprise.

Sales Leap Defies Anti-Mainframe Campaign

After a quarter like System z just had, it’s difficult to see how or why competitors are still writing epitaphs for Big Iron

The Greening of IT: Cutting Power Consumption is Just the Beginning

It’s all-but-official: electrical power consumption is a big issue today and will be an even bigger issue tomorrow.

Foiling Hackers with NAC: First, Know What You Have

Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.

NAC Up Close: Policy Enforcement Options

In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.

Network Appliance Clustering: What’s Going On under the Covers?

Feedback on our column about clustering inefficiency.

Kalido Revamps Data Warehousing Platform

Kalido is that rarest of extant creatures: a best-of-breed DW vendor. With a wrinkle or two, of course.

The SQL Server 2005 Learning Curve Revisited

For some organizations, surprisingly, SQL Server 2005 has been a more or less turnkey migration experience—especially on the BI front.