Features & News


Case Study: Securing Mail Transactions in Any Form

Encrypting information and keys in hardware

Case Study: Outsourcing Data Quality

By verifying names and addresses over the Web, Saab provides near-instant lead generation for its dealers

Business Objects Updates ETL Tool

New features for Oracle databases, data quality capabilities, and integration with Crystal Enterprise highlight new release

Businesses Ignore Mobile PDA Threat

When it comes to mobile devices, why do so many companies avoid the security issues?

In Brief

Cisco sign-on, IE cross-scripting lead vulnerabilities this week

Q&A: Scaling Application Expertise Helps the Help Desk

Mercury Interactive's new Resolution Center encapsulates expertise for first-tier help desk personnel

Five Ways to Promote Your IT Department and Gain User Support

From newsletters to user surveys, making your IT department more visible to end users offers big rewards



Swap Green Screens for a Web Interface in Under an Hour

IBM says its HATS tool can quickly expose mainframe applications to the Web

Reader Mail: A Response to the FCIA

The author outlines 10 reasons why he disagrees with the FCIA's view of FC SANs

Microsoft: OLAP Market King?

A British market research firm reports that the software giant had the leading—but not dominant—OLAP market share last year, despite selling an old product

Security Briefs: Encrypted Attachments Carry Threats

Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

The Spreadsheet Is Dead—Long Live the Spreadsheet

Companies using spreadsheets alone can spend five months or more on budgeting and planning than those who use spreadsheets with other planning and budgeting tools, analyst says.

SAS9—Better Late Than Never

SAS makes its formal debut as an end-to-end BI player

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Q&A: Long-Distance Disaster Recovery

While the distance limitations of the technology remain unchanged, vendors have been demonstrating that extended-distance clusters can work

IBM Acquires Monitoring-Toolmaker Candle

Big Blue fills in gaps in its systems management portfolio by buyout of 28-year-old company.

The Changing Face of Host Integration

Rather than moving host applications off the mainframe to save money, analysts suggest that it's time to look into service-oriented architecture

The Sun Also Rises ... And Sets ... And Rises ...

Sun announces a development partnership with AppIQ, which offers a combo storage resource management/SAN management product called StorageAuthority Suite.

PeopleSoft Announces Industry-Specific CRM

Company seeks to expand the definition of CRM to include non-traditional customers