Vulnerability in the encryption system used with ASP.NET
Given all the buzz about desktop virtualization, is the technology right for you? What's holding up adoption, and what should you know before you embrace the technology?
IBM’s $1.7 billion acquisition of Netezza is the second major DW-related acquisition this year, following EMC’s purchase of analytic database specialist Greenplum this summer.
Internet Explorer 9, released in beta form, doesn't talk to strangers
If shops don't figure out how to accelerate their cumbersome data warehousing projects, their information consumers will pass them by.
In a 24/7 marketplace, you need reliable and timely information. We explain the data integration challenges and how to overcome them.
Mobile service providers struggle to match data usage to revenues. A new kind of BI can help.
Traditional analytic best practices are slowly being supplanted by what might be called the analytics of the particular.
The New York Post reported Wednesday morning that Novell has agreed to "a deal in principle" to sell itself in two separate parts to two separate buyers.
Apple, Google and BlackBerry are biggest gainers in "brand value" in 2010
A controversial new report shows vendors are leaving enterprises seriously exposed.
The benefits and best practices of using tape discovery.
New tape cartridge can store up to 35 TB of data in LTO form factor
What was Intel thinking? Was a vision of a hyper-connected future -- powered by hyper-secure embedded microprocessors -- a big factor?
Oracle has hired former HP CEO Mark Hurd as co-president.
Do Intel's new processors signal a seminal moment in storage innovation?
IT asset management (ITAM) is a tactical foundation corporate executives need to make sound strategic decisions. ITAM needs more than just an administrator to manage it.
Today's security market differs greatly from the market that was hammered almost a decade ago, following the dot.com implosion.
Smart storage isn't about applications running on an array controller; it's about manageability of the infrastructure.
Virtualization’s great promise may be compromised if virtual machines can't be easily recovered.