Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.
Acquisition of DataDistilleries makes sense, as products are highly complementary.
Version 7 features new Web services-oriented architecture and supports for LDAP and CWM
China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.
One leading research firm says that enterprises need to actively investigate their reporting solutions and determine whether they comply with three key areas of Sarbanes-Oxley legislation.
Automation is the real key to real-time infrastructure, and today’s infrastructure is anything but real time. The solution: Gartner analysts tout a technology vision that centers on a dynamic, two-way relationship between IT and business processes. Gartner also identified three technology triggers required to achieve this new business process fusion.
Novell's track record with high-profile acquisitions is spotty, but users we spoke to believe IBM's $50 million investment in Novell is encouraging.
Though 96 percent of techies say they want to work from home at least part time, (according to a techies.com survey), their top priorities are much different. IT workers are influenced much more by f
In a seemingly endless series of leapfrogging announcements, HP reveals record-breaking server performance over IBM
A new supercomputer with blistering performance of 60Teraflops running on standard Intel x86 processors?
Analyst firm says the waiting is over: IT spending is about to come back into line after two horrible years of IT budget declines.
With a raft of recent mainframe-related announcements, IBM Corp. is making a good case that Big Iron is far from dead.
MAKO is a slimmer, more elegant, and more capable implementation of their existing technology that combines several new architectural features that make it worth a look.
A newcomer dominates this month's list
Most users with whom we spoke say they will stay with their installed product, and they can’t imagine using anything else. Some, however, indicate that if they’re not satisfied with Business Objects’ service and support, they may tap Microsoft Corp.’s forthcoming SQL Server Reporting Services.
The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.
With its acquisition of Brio complete, the company announces tentative product integration plans.
Suite's set of J2EE-based services supports customer-focused business processes, but the company's small user base may make it an attractive takeover target.
A new report from McAfee examines European companies' vulnerabilities.
Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.