Features & News


Worm Writers One-Up Each Other

The battle to capture your e-mail address has gone to new levels: deleting competing worms.

Trends: Companies Pushing BI Data to More Workers

Companies are spending more to support line-of-business workers with data than on projects for strategic decision makers (read, executives). Such actions are intended to help organizations streamline costs and save money.

Touching SAP Data: User Access and Biometrics

Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.

Vendors Heed Growing Demand for Linux-Based BI Solutions

Enterprises look to Linux to cut costs, with financial services leading the charge, but will SCO's latest Linux lawsuits stymie demand?

Siebel's

A repackaged CRM Midmarket Edition, the product's lower price should appear to small and mid-sized companies. Siebel is working with third parties to provide fixed-price integration and implementation services.

IBM to Supercharge DB2 for z/OS in Version 8 Upgrade

Company says DB2 version 8 will deliver the biggest feature and functionality update in the database’s history.

SCO Back on the Warpath

SCO backed up its threats with action, taking two enterprises to court over their use of Linux.



Big Blue Rides zSeries to Server Market Crown

IBM outpaced competitors HP and Sun in worldwide server revenue growth.

The Perils of Modifying Software

A study of two companies shows that modified code can increase defects three-fold. It takes disciplined inspection and continuous software-development process improvements to increase software quality.

Aligning Storage Costs with Business Priorities

A proposal for a “three dimensional approach”: automating storage provisioning and device management, data movement, and data replication.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Alerts

New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files

Hosted CRM’s Killer App

Web-necessary CRM applications can enable new business processes that aren’t possible with on-premises CRM solutions.

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Q&A with SAS: The State of the BI Industry

Look for continuing consolidation (including a possible acquisition by SAS). The President and CEO of SAS also sheds light on packaged analytic applications, the convergence of production and analytic reporting tools, and the company's next version of its BI suite.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Salesforce.com Builds a Bridge to WebSphere

With sforce Toolkit for WebSphere, companies can tap WebSphere Application Server and WebSphere Studio Application Developer to build CRM solutions that integrate customer and sales information with their own applications.

Solving Application Problems: IT Still Stuck in Reactive Mode

Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.

How to Avoid Problems When Wireless-Enabling Your Application Infrastructure

From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.