Business process management and complex event processing now support a broad range of business processes. How can these two technologies complement each other to further optimize business processes?
This pair of modern techniques will help you succeed in your enterprise data quality initiative.
A pair of recent announcements offers fresh -- and refreshing -- insight into the new Vertica four months after its acquisition by HP.
Predixion proposes to take data mining -- long the province of statisticians and complex predictive models -- and make it pervasive.
What's it take to be a Microsoft-centric BI player? It may be a matter of picking up where Redmond leaves off.
In the age of the cloud, applications and content are only as good as the network they ride on. We explore three application acceleration options.
Available to volume licensing customers on Software Assurance plan, TechNet and MSDN subscribers, and some partners.
Automated testing tools can relieve the tedium of testing, but are they appropriate for every testing task?
NetView 6.1 is, by almost any standard, an exciting new deliverable -- particularly for users of IBM’s Geographically Dispersed Parallel Sysplex technology.
Company eliminates charge for inbound data transfer across all services in all regions.
When you recruit business analysts, what traits should you look for?
It's time to consider data warehousing in the clouds as a viable option.
We explore three aspects of agile that form a synergy that doubles a team's development velocity.
Tape is currently enjoying a renaissance in data storage. Speakers at the third Global IT Executive Summit shed light on what's ahead.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
Business and IT executives aren't always on the same page when it comes to virtualization and cloud computing.
There are few bright spots in a new survey of CIO hiring plans.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
What’s holding back some enterprises from enjoying the benefits of cloud computing?