How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment
After several fits and starts, is Siebel finally getting serious about business intelligence?
Human error and security; AOL's two-factor authentication; September viruses
Microsoft rebrands ETL facility, beefs up Analysis Services, and hints at plans for ActiveViews end-user query and authoring technology
Increasingly, PCs must prove they're secure before a user can log onto the network
Knowing how today's hackers think and work is the first step to combating their attacks.
EII technology lets ProClarity use data from many more sources
Big Iron was once again in vogue last week as IBM made a raft of new mainframe-related announcements
Few users seem excited about PeopleSoft falling into Oracle’s hands—except those who use Oracle’s database software
Using existing development methods, companies end up with software that doesn’t do what they need it to do. Agile software development offers a new mindset and approach to building applications that succeed.
A Service Level Management process may be what IT service organizations need to better support business demands.
Like The Dating Game and other highbrow TV fare of yesteryear, the time may be right for the development of new game shows—focused on the storage industry itself.
Company expands focus from sales force automation to include customer service and support
Creating a baseline of security for servers and clients is essential for a secure environment.
With compliance deadlines looming, is it too little, too late?
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
Users can now tap SQL Server 2000 Reporting Services to report against Microsoft CRM data
IT must cope with under-funded regulations, more CIO leeway
RealPlayer and JPEG vulnerabilities; security insurance
Partnership with IBM gives BI users a single view of data stored in DB2, VSAM, and IMS sources