Features & News


Rx for Enterprise Information Integration Woes

Avaki's Data Grid 4.0 is designed for highly distributed environments

Alert: Vulnerability in SSH

Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.

CERT: Best Practices for Beating Worms

CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.

Business Objects Updates Next-Gen BI Suite—Again

Enterprise 6.1 finally delivers on the promise of ETL

Resistance to Hosted CRM Fades, Survey Finds

CFOs' concerns about hosted CRM are no longer deal-breakers

Career Satisfaction: Take Our Quick Quiz

Answer ten short questions to gain insight on how satisfied you are with your career.

IBM Touts zSeries to Simplify IT Infrastructure

Big Blue discusses the idea of reducing network and application tiers, and offers a model that combines zSeries technology with Intel-based server blades.



Unlikely Partnership for Next-Generation Web Services

IBM and Microsoft are fierce competitors, but they've united to deliver protocols that will deliver a reliable and secure messaging and transactional infrastructure for heterogeneous environments.

Microsoft "Humbled" by Recent Security Problems

Microsoft CEO Steve Ballmer acknowledged last week that his company has been "humbled" by the effects of the Blaster and Sobig.F worms, and outlined his company's "comprehensive approach for better se

EMC on the Brain

Vendors must learn that juxtaposing one’s own products with EMC’s as a means for advancing one’s own value proposition is silly.

Survey Says: Poor Data Quality Is Costing You Money

Over 90 percent of respondents concede they haven't invested in modeling and analysis tools to help them make sense of inaccurate, incomplete, or obsolete data.

Sarbanes-Oxley: The Role of Business Intelligence and Data Management

The requirements for compliance will soon become clear. In the meantime, companies can gain greater control of, and visibility into, their financial data and transactions from a BI and DM solution that fits within a framework of financial governance.

SPSS 12: Better Output is Just the Beginning

A data cleansing tool, redesigned presentation graphics, and improved inferences for complex sample data are among the highlights of this predictive analytics suite

Accelerating Security Certification

Can information security professionals really get certified in half the ordinary time?

Finding Security Holes in Your Web Applications

The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security

Authentication: Three Critical Steps for Every Organization

Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.

Mainframe Technology Trickles Down to iSeries

A new iSeries offering provides mainframe-like features—advanced backup, replication, and high-availability clustering—across IBM's eServer product line.

Enterprise Surprises: Where To Find Those Elusive Profits

The secret: an integrated business design

Python Offers Intelligent, Provocative Approach to Tape Automation

Spectra Logic proves it offers products and pragmatism; Python will raise the bar for other vendors.

Best Practices: Handheld Security

Handheld security expert suggests best practices for organizations that support the devices