Security managers race to stem a mass outbreak
In a business-historical sense—more precisely, in a BI-historical sense—2005 was one for the history books.
It’s tempting to think of data quality as a soon-and-inevitably-to-be-commoditized technology segment. But think again.
When it debuts, Mendocino will more tightly couple Office with SAP. But don’t look for it before this summer.
The revamped i/Lytics is a solid release on the whole—but analysts say Innovative shouldn’t rest on its laurels.
Some say dashboards; others master data management; still others tout the maturation of integrated business intelligence suites. But beneath all that is a powerful undercurrent.
MySQL gives Business Objects a cost-effective alternative to IBM, Microsoft, and others. This isn’t an unalloyed good, however.
Business Objects extends open arms to MySQL; but ‘coopertition’ must be carefully played.
Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.
10, 9, 8……let's see what the future holds.
From acquisitions to outsourcing, it was a very busy year
BIRT and Crystal aren’t the only game in town. There’s also JReport, which—in its new version 7.2 release—incorporates a bevy of improvements.
As customers finish up with their Cognos 8 implementations, the company’s holistic performance management pitch might look even more appealing.
Teradata, Netezza, and DATAllegro take aim at one another.
Problem identification is no longer sufficient—what's needed is the ability to diagnose and repair problems quickly before they seriously impact your customers or end users.
Sarbanes-Oxley compliance started chaotically. By its second year, however, many organizations were investigating how automated controls could help them see SOX not as an annual cost but as a way to reduce business risk. What’s in store for year three?
If you don't have something nice to say, say nothing at all, right? Storage columnist Jon Toigo ignores that advice as he looks at the three worst events and trends in the storage industry this year.
Does grey knight CA—“the industry’s safety net”—have a new set of priorities?
"Trust but verify" is no longer enough; today you must trust, verify, and triangulate in order to acquire organizational knowledge that you can rely on.
Spyware poses a huge threat—yet a recent survey shows that by their own admission, many enterprises have yet to protect their information with suitable anti-spyware software.