Software


Best Practices in System Copy: Automate in the Cloud

Cut the cost and improve the accuracy of SAP system copy chores.

SCADA Protocol Testing in Critical Infrastructure

We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.

5 Questions to Ask When Shopping for Unified Storage

Five questions your business should ask of unified storage vendors so you don't have to compromise on performance, scalability, or cost efficiency.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

Can Machines Really Think?

The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.

Q&A: The Role of Social Networks in the Enterprise

Your employees are comfortable with social networks. How can those networks be turned to your business advantage?

FairCom’s Updated c-treeACE Bridges SQL, NoSQL

Developers can map non-relational data as relational (SQL) without modifying the data.



Dell Introduces User and Device Management Cloud Service

Dell Wyse Cloud Client Manager provides a single point of administration across end-user service scenarios without the need for on-premise management hardware or software.

Updated Decathlon DCIM Solution Optimizes Reliability, Energy Efficiency of IT Systems

Decathlon Version 2 provides accurate, fine-grained visibility into device and system performance, expert decision support, and secure control technologies.

Micro Focus Introduces Free Integrated Development Environment for IBM Mainframe Application Modernization

Entry-level version of Micro Focus Enterprise Developer offers a choice of Eclipse or Visual Studio IDE to develop enterprise-class mainframe and distributed applications.

SuperLumin Networks Releases Nemesis 2.4

OS updated to SLES 11 Service Pack 2.

IT Governance Toolkit Helps Organizations Meet Business Continuity Requirements

Solution includes templates for policies and procedures, offers PDCA guidance, and includes an implementation checklist to assist enterprises in meeting ISO22301 best practices.

Content Matrix 6.0 Helps IT Upgrade, Migrate, and Organize SharePoint Content

Combines fast upgrade and migration speeds with content organization tools for improved knowledge sharing and collaboration with SharePoint 2013.

From Users to IT -- How Tableau Broadens Its Appeal

Tableau first cracked the enterprise by inspiring envy among users. Increasingly, it's trying to do the same thing with IT.

Why Climbing onto the Cloud Just Makes Sense

We examine the three characteristics any cloud infrastructure should have.

Q&A: Application Performance Management in Action (Case Study)

When Web apps get busy, IT must ensure performance doesn't suffer. We examine how the UK's Nisa Retail used APM to keep its members (and their customers) satisfied.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

Reports of E-mail's Death Greatly Exaggerated

E-mail isn't dead. In fact, it's more alive and robust than it has ever been.

Best Practices for Creating an Effective Business Continuity Plan

Your business continuity plan must focus on three elements: people, infrastructure, and processes.

BlueStripe Transaction Monitor Tracks Individual Transactions without Code Changes, APIs, or Network Appliances

FactFinder v7 with TransactionLink technology ties together transactions, applications, and the infrastructure automatically. BlueStripe Software