Features & News


Q&A: How Security Budgets Determine Compliance Success

New study highlights commonalities between companies with the fewest IT compliance deficiencies.

Podcast: Trusted Computing

Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives

2006 Salary Survey, Part 2: Raises for IT Executives and Managers Remain Tepid

An improving economy and more robust IT budgets are helping loosen the budget purse strings for key IT line staff positions but not for key management positions surveyed.

Hummingbird Versus Its Shareholders and the Acquisition Go-Around

The content management specialist last week agreed to be acquired—for the second time this year, in fact—by an admiring suitor.

A Closer Look: Oracle’s New Warehouse Builder R2

Is OWB R2—which Oracle bills as a “completely free” core ETL tool—really that?

The Brave New World of Business Intelligence

The next wave of business intelligence will once and for all take BI mainstream, with query and analysis front-ends on every desktop.

Analysis: IBM Takes the Opteron Plunge

With Intel finally righting itself after years of floundering in AMD’s wake, why did IBM pick now to take the Opteron plunge?



2006 ESJ Salary Survey, Part 1: Salaries Grow for All IT Staff Positions

In the first of our four-part report, we look at compensation growth for professional positions.

Development Environment Detrimental to Application Security

A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers

Building Storage, Part III

Acquisitions, new releases, value-added hype --- what can we believe and who is offering something new?

Two-Factor Authentication: The Single Sign-on Solution?

New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines

Open SOA Sells—But Microsoft Isn’t Buying

Microsoft’s absence in new initiatives troubles industry watchers

Hierarchical Usage Models (Part 2 of 3)

Using a layered approach can help expand usage analyses to more complex projects.

Podcast: Creating Strategies to Prevent Internal Threats

Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.

Business Objects Unveils Data Quality XI

Before customers can adequately take stock of BO’s EIM push, it must deliver next-gen versions of its ETL and EII tools.

JasperSoft Flies the Coop

Organizers say JasperForge.org is the start of something big—but users grouse that the transition from the Sourceforge nest hasn’t been without a hiccup or two.

Microsoft’s Strong Gains Portend BI Superpower Status

Don’t look now, IDC’s Dan Vesset cautions, but Microsoft has the potential to radically reshape the BI landscape.

How Automation Can Improve Business Service Management

Is IT getting the most from its BSM investments?

DataMirror Tweaks Mainframe CDC Tool for Performance, Reliability

DataMirror last week trumpeted what it describes as “significant” performance improvements in the latest version of its Transformation Server for z/OS

HP Bets Big on Software with Mercury Interactive Purchase

By putting $4.5 billion of its money where its mouth is, has HP finally put the lie to the canard that it isn’t serious about software?