Two companies have teamed up to simplify creating voice-enabled applications 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Protecting mission-critical data means looking at port and USB vulnerabilities.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Are next-gen dashboards too good to be true? It all depends on what you mean by "dashboard," industry watchers say. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Far from being a BEA-only deliverable, ALDSP is a bona-fide EII contender, analysts say.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If both Gartner and IDC say a trend’s a trend, then it must be a trend, right?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Huge computer distributor sees immediate benefit from rules management
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Sooner or later, technology to allow a true ILM was bound to come along.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Two mainframe number-crunching mainstays make their bids for broad BI dominance
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Management of IT performance for business results is within the reach of most organizations
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    BI 2.0 gives you “one version of the truth” in real time.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Thirteen percent of CIOs expect to hire new IT workers in the coming quarter
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Business Objects must surmount several obstacles on its way to BPM prominence.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Officials say the new suite will help SPSS break through to mainstream success.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Forget thin clients, the next frontier in enterprise information delivery might be mobile, roaming, or—heck—even roving clients.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why IT must take a lowest common denominator approach to dealing with the suits
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IBM is touting a more abstract kind of workload—the mainframe-as-service-enabled hub
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As you consider your archive options, don’t count out optical.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s a challenge to bring the mainframe into the modern age of service-oriented architecture but there’s a huge payoff once the job is done.