Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
Enterprise planning needs to provide CFOs enough reaction time to respond to problems. Spreadsheets are cumbersome and don't provide a good corporate overview. So what tools should planners use?
Companies say users of Siebel’s analytical applications can more efficiently get at the massive amounts of data stored in a Teradata warehouse
Outsourcing can bring lower costs and increased levels of service, but be sure your Service Level Agreement is part of your contract.
BMC's director of its MainView product discusses IBM's takeover of Candle, plus getting the best value from licensing
Twenty industry members say alliance will encourage and accelerate the development of grid solutions for the data center through interoperability solutions
International Data Corp. reports the first meaningful increase in IT spending since 2000—mostly in the western U.S.
Catalyst's visionary ComponentsNow marketplace for SAP users; Manugistics updates its progress on strategies announced at last year’s Envision conference, plus insight into company's view of its market
Big Blue continues its push of entry-level mainframes into midsize companies with aggressive pricing, 28 capacity levels
Disaster recovery planning must become an integral part of application development so the right middleware and coding choices are made at the outset of system design.
Highlights of the latest release include support for WebSphere and Lotus notes, improved sales lead management, and improved calendaring from the hosted CRM vendor.
Detect, then actively block, unauthorized WLAN users
Company replaces Excel with a new dashboard in its Activity Suite, its business activity monitoring software.
Established ETL purveyors must increasingly compete against database vendors for market share, though no vendor consolidation is forecast.
By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Security policies and education aren't enough
Company says its new JDeveloper 10g IDE delivers a J2EE development environment that simplifies J2EE coding non-Java programmers and facilitates development for computational grids.
Company says Web services interfaces can simplify how customers and partners integrate SIM with their applications and products
In a market with few innovations, we find some noteworthy achievements among storage vendors and their promoters.