Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now
SAS’ PM platform release gathers together—under one big proverbial tent—several PM products it has marketed for years.
Business Objects and IBI hop on Google’s OneBox Enterprise Bandwagon
Hail Mary or Hail Abbasi: Is Informatica’s come-to-SaaS moment a case of a vendor leading the market by its nose?
What Big Iron shops of all sizes have to say about the future of the mainframe is encouraging—to say the least
Match your knowledge with In-Stat’s latest broadband report.
Many market observers might yawn at SAP’s recent Premium Support announcement, but users increasingly appreciate more choice and certainty, and may take notice of what the market leader is trying to do with this middle-of-the-road support option.
From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.
The fur will fly as Centera flaws are exposed
CA says it has developed a change management product family the integrated whole of which is much greater than the sum of its parts
Are content management systems up to SOX compliance? Also, how spyware affects small and medium-size businesses.
Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.
Is EII a lead-pipe cinch or a lead-pipe dream?
If your company lacks a data strategy, can you really reap the benefits of business intelligence?
Unicorn’s technology will help beef up the SOA and MDM capabilities of Big Blue’s WebSphere and Rational product families.
How can companies automate the heavy lifting of metadata integration and entrust the rest to domain experts who really know the data?
A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
How to maximize system availability in a Web-enabled environment
Big Blue announced initiatives to help programmers and ISVs get that old-time mainframe religion
How a pair of protocols and unique interconnect software can lead the way to inexpensive storage