A 2006 report from Boston-based market researcher Aberdeen Group shows 90 percent of survey respondents say their companies are adopting service-oriented architectures.
Business Objects hopes to do for data visualization what the former Crystal Decisions once did for reporting: make it ubiquitous.
When users speak, says Office BI guru Alex Payne, Microsoft listens.
With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.
Ipedo last week announced a refresh of its EII suite that’s tweaked for service-ability, officials say.
Want to learn AJAX from the ground up? Or polish your developer skills? A free online course begins Aug. 4.
A slew of new SOA management functions are available through a new version of CentraSite, including a plug-in that lets developers ease into integration within Eclipse-based dev environments.
One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.
Two key questions must be addressed: what do you back up and how do you do it?
What problems BPM solves, plus considerations in build-vs-buy decisions.
zLinux or Big Iron J2EE workloads perform better and are cheaper than their RISC- or Intel-based alternatives
Why organizations are increasingly adopting the IT Infrastructure Library
Simple disk-to-disk backup system yields reliable restores
How many new tricks can you teach an old pre-relational database? Plenty, especially if customers are still actively banking on it.
Cognos is no stranger to professional services, having collaborated with an ecosystem of partners for some time, but last week’s announcements marked its most ambitious foray into the services game yet. Some analysts say Cognos’ move has the makings of a proverbial double-edged sword.
Actuate 9 is a pivotal release for a company that continues to plot a best-of-breed course in a rapidly consolidating BI marketscape.
Last month, Celequest notched a deal with NEC to develop a compliance appliance for the financial services industry.
Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.
The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive