One quarter of budget spent on hardware
Microsoft releases two "important" patches in its March security update.
ReiJane Huai, chairman, CEO, and co-founder of FalconStor Software, discusses his pioneering work in tape backup software for distributed systems.
We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.
To help IT manage its file deluge, vendors are trying to develop a platform that delivers respectable performance for file access vendors. They're really just building a bigger junk drawer.
One way to keep problems from compromising your enterprise is to have a good monitoring system in place. We discuss the drivers and benefits of business transaction management, how it fits in your environment, and how your colleagues are using it.
Though mainframe sales may be down, commodity server sales are strong.
No future versions of midmarket server.
The mood at this year’s TDWI Winter World Conference may indicate that 2010 will turn out to be a great year for BI and DW.
A new survey reveals that companies still struggle with DW issues and are not leveraging enterprise data warehouses.
Most data- or information-integration vendors tend to have ulterior motives when it comes to MDM.
What impact does BI have on compliance?
Consumer data in vulnerable during development, testing.
People must be able to trust the cloud, RSA president says.
Given its widespread adoption, service-oriented architecture is clearly an integral component of cloud computing and software-as-a-service. However, without the management tools to address such issues as application performance, the rapid development and deployment of SOA-based services could fail.
Digital Reef CEO Steve Akers explains the challenges confronting companies as they try to bring order to their storage junk drawers.
We explain how to leverage data from switches and routers using flow monitoring.
Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.
PDF has now supplanted another Adobe technology -- Flash -- as the exploit platform of choice for malicious hackers.
The database industry is at a crossroads, but few agree on where things are headed.