Instant decision-making on high-volume, high-velocity data streams isn't a new challenge.  We examine seven principles to help manage RFID data.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SLAs help ensure the timeliness and success of your application implementation, but they're anything but a slam dunk
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IBM releases two new and three updated CICS tools
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    CIOs talk up employee retention strategies; the return of travel, training, and table tennis
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Adaptec and SNAP have found each other—and that bodes well for all of us  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New modules in the Linux 2.6 kernel make for easier host-based application security.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Verifying PC security compliance before granting network access
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    A merger marked by complementary products that work synergistically—we talk with Business Objects about their acquisition 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Users say they’re mostly satisfied with the six-month-old version 1.0 product—although almost all have a pet peeve or two they’d like Microsoft to fix
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New data warehousing bundle taps IBM’s DB2 database, MicroStrategy’s BI platform 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    To gain control of data and systems, IT consolidated their environment.  A better solution is emerging: optimization tools.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How IT organizations are spending their budgets
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Financial services giant finds happy medium between performance and availability with Big Blue’s new DR service for zSeries
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SCO’s day in court almost couldn’t have gone much worse; company says it's only a minor setback
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Is there a role for the independent integrator in the well-demarcated world of storage vendor relationships?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Finally there's software to let enterprises remove spyware. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New data monitoring component to assist validation, compliance efforts
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New data extraction tool boasts .NET underpinnings, OLE DB, RSS support