Features & News


Careers: Salary Survey Needs Your Input

Salaries, satisfaction, and training -- tell us where you fit

Spring Busts Out: Part II

From "thin provisioning" to a report on the storage outlook in the small to medium-sized enterprise world, we look at the silly side of Spring.

Service Targets Data Quality Pitfalls

Firstlogic’s new data quality services offering promises to help companies quickly get up to speed on the technology

Database Security Requires a Multi-Pronged Approach

Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption

Q&A: Security Best Practices Include Automated Remediation

Automated vulnerability remediation exists, but most companies still take a manual approach

Your Stake in Data Auditing - Part 2 of 2

What auditors and database administrators need to know

In Brief

Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves



Q&A: Managing Exploding Data Volumes

Stephen Brobst says Teradata’s vision of “extreme data warehousing” is about a lot more than just an attention-grabbing marketing term

Examining the Aftershocks of IBM's Ascential Acquisition

Because of the range of BI partners impacted, IBM's Ascential buyout could prove to be the most disruptive BI acquisition to date.

A Strategy for Improving Knowledge Work

In search of a strategy that can improve knowledge work just as industrial work was improved in the last century.

Taking the Fight to EMC: IBM and NetApp Partner for NAS, iSCSI

Companies hope to blunt the momentum of storage appliance partners EMC and Dell

Offshore Outsourcing: Success and Savings Still Elusive

Despite unimpressive results, offshore outsourcing market is growing rapidly. Even so, plenty of offshore adopters could bring it all back home again

Windows Gains Ground on Linux

Microsoft has had some success in improving the image of its Windows Server 2003 operating system vis-à-vis Linux

Spring Is Busting Out All Over

New technology blooms in the Storage garden

Your Stake in Data Auditing - Part 1 of 2

What CFOs and CIOs need to know

Datawatch Updates Heterogeneous Data Access Tool

Monarch 8 lets users extract information directly from PDF files for analysis, or export data from PDF files to spreadsheets or databases

From One Security Nightmare To Another

Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data

In Brief

Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide

What's Ahead for Enterprise Anti-Spyware

Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid

Informatica's Move in a Changing Marketplace

With IBM/Ascential, Informatica/Composite, and other announcements taking center stage recently, it's clearly been a disruptive spring in the data integration market