Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Database player notches strategic alliance with Applix, reseller agreement with Ascential
Metadata architecture is the lynchpin of the overall archive architecture. We explore three types of metadata: contextual, descriptive, and audit/control.
IBM’s move could drive down the cost of entry for many potential adopters—and stimulate additional sales for BladeCenter
The gap between top-performing and middling companies is widening. Could some organizations be left permanently behind?
A new report says CEOs do, and disproportionately at that
Is Network Appliance's grid storage campaign just marketing fluff?
Aeroplan adopts an XML firewall
Cognos taps the services of a Swedish consolidation and financial reporting specialist to strengthen its BPM stack
New open-source reporting tool tempts Java developers by giving them a way to incorporate reporting functionality into their applications at no cost
CEO isn’t worried about Microsoft’s ascendant credibility in the BI space
Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities
Company offers outsourced wireless LAN to overcome security vulnerabilities
Short-term data loss isn't all you have to guard against
A cooler, more flexible, and more powerful Itanium design may yet succeed where brute force alone hasn’t been enough
Company’s technology will help extend the capabilities of IBM’s DB2 software for documents, images, digital media, and Web pages
Call-services specialist Rockwell tapped an outside QA specialist to nip potential application performance issues in the bud. It’s a growing trend.
Could the future of storage be in plastics?
Budget increases don’t necessarily translate into increased BI spending—not, at least, in the form of new projects or other initiatives