Many IT pros remain skeptical about service-enablement, but—as a growing number are finding out—they don’t have a choice in the matter
Is it true that the storage world is upside down in the southern hemisphere, too?
Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles
CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
Reducing computing systems’ exposure to attack may be the goal, but unhooking network connections—or “denetworking”—is rarely feasible. A network endpoint appliance may be the answer.
Cognos announces an ambitious partner program and gives customers a glimpse of its forthcoming Cognos 8 BI suite, now in beta
Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.
Executives are increasingly hip to the importance of business intelligence as an aid to decision-making
IBM tries to keep current Ascential customers happy while satisfying the needs of new adopters attracted by the promise of its all-in-one data integration move
Integrating teams is the key to outsourcing success
CA last week announced a sub-capacity pricing initiative for VSE that helps bring that platform up to speed with its flashier sibling z/OS
With canned ETL already on tap from Microsoft and Oracle, what—if anything—does IBM have planned for DB2?
Big Blue might have plans to hire at least 14,000 additional workers this year—in India
Who does the second-guessing is not always who pays the piper.
Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.
Business Objects’ James Thomas dismisses Microsoft’s Reporting Services as just another in a line of Crystal “clones”
If EII is indeed on the cusp of going mainstream, technology pure-play Ipedo is a name you might want to remember
Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.
CSI plans to leverage its professional services expertise to address data quality shortcomings