Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives
An improving economy and more robust IT budgets are helping loosen the budget purse strings for key IT line staff positions but not for key management positions surveyed.
Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.
The content management specialist last week agreed to be acquired—for the second time this year, in fact—by an admiring suitor.
The next wave of business intelligence will once and for all take BI mainstream, with query and analysis front-ends on every desktop.
Is OWB R2—which Oracle bills as a “completely free” core ETL tool—really that?
A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers
Microsoft’s absence in new initiatives troubles industry watchers
Using a layered approach can help expand usage analyses to more complex projects.
Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.
With Intel finally righting itself after years of floundering in AMD’s wake, why did IBM pick now to take the Opteron plunge?
In the first of our four-part report, we look at compensation growth for professional positions.
New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
Acquisitions, new releases, value-added hype --- what can we believe and who is offering something new?
Before customers can adequately take stock of BO’s EIM push, it must deliver next-gen versions of its ETL and EII tools.
Don’t look now, IDC’s Dan Vesset cautions, but Microsoft has the potential to radically reshape the BI landscape.
Organizers say JasperForge.org is the start of something big—but users grouse that the transition from the Sourceforge nest hasn’t been without a hiccup or two.
Is IT getting the most from its BSM investments?
Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.
DataMirror last week trumpeted what it describes as “significant” performance improvements in the latest version of its Transformation Server for z/OS