Allocating sufficient time and resources to conduct a thorough data profiling assessment will help architects design a better solution and reduce project risk by quickly identifying and addressing potential data issues.
How to scale the data tier to get better performance.
The market for SaaS business analytic technologies is set to surge, according to a new report from research firm IDC
Data found in warehouses is mostly transaction-oriented -- data from repetitive activities that are an integral part of every organization's business. Bill Inmon and Geno Valente look at what's ahead: textual data.
To help IT leaders make the most of data virtualization, Robert Eve, executive vice president of marketing for Composite Software, offers a list of virtualization suggestions.
Microsoft's Web browser was exploited for attacks on Google
This approach can help you achieve data classification results dramatically faster than conventional methods.
With its acquisition of Sun Microsystems completed, Oracle Corp. on Wednesday laid out its plans for integrating Sun's software and hardware systems into its own product lineup.
Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.
Forrester Research advises IT shops to assess environments before upgrading to Microsoft Exchange 2010.IT shops should assess their environments before upgrading to Microsoft Exchange 2010.
In 2010, vendor marketing campaigns will ramp up with the usual hype.
A simple and affordable change you can make today can mitigate the risks of the DNS layer.
Windows Azure and SQL Azure represent Microsoft's official challenge to Amazon's Elastic Compute Cloud (EC2) service
Asset management software can complement your current security tools to provide more complete desktop security.
A two-part approach can help IT comply with SLAs to satisfy end users.
Harried by legal, regulatory, or competitive concerns, organizations are increasingly paying much more attention to their desktop backup strategies.
IT and business must learn to speak a common language, manage according to business outcomes, and organize for value.
Report spotlights ease of attacking consumer accounts; password selection patterns haven’t changed in 20 years
Make-shift tool to check for patent-infringing technology in Word files