Software


Research Reveals Steps to Protect Sensitive Data

A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.

Podcast: Simplifying IT with Standardization

IT standardization is a necessity, but it’s time for a new, non-traditional approach

Podcast: Effective Disaster Recovery

We explore the problems and best practices for managing a remote location for disaster recovery.

Microsoft Releases Office 2007 Service Pack 1 Early

Update focuses on stability, performance, and security

Careers: Downturn? What Economic Downturn?

The hiring outlook for early 2008 looks as solid as ever, with double-digit IT job growth forecast by at least one industry watcher

Ten Tips for Smarter E-mail Archiving

We offer prudent best practices that minimize risk and are broadly acknowledged with widespread use because they work.



In Search of Stability amid BI Industry Upheaval

Are privately-held BI players safer bets than their publicly-traded counterparts?

BI Careers: Knowing Technology Isn’t Enough

BI veterans give tech workers advice on getting ahead in the industry without burning out first

IBM Partners with Appfluent to Improve DB2 Warehouse Scalability

Just because IBM went out and bought itself a best-of-breed BI player doesn’t mean it can’t and won’t partner with other BI competitors

IBM Notches .NET-to-J2EE Integration Accord

Industry analysts say the IBM/Mainsoft accord is a Very Good Thing for users of mixed .NET and J2EE environments

Podcast: What Drives Top Performance in Change Management?

When it comes to change management, do ITIL and CMDBs make a difference?

IBM’s Energy Efficiency Smoking Gun

Industry watchers see Big Blue’s mainframe power efficiency push as a signal event in the longstanding scale-up versus scale-out system wars

Best Practices for Solving Problems in Non-z/OS Environments

How problem solving is different in mainframe and non-z/OS environments, and how you can accelerate troubleshooting convergence.

LTO-4 Security: Are Vendors Fibbing or FIPSing?

Marketing can lead IT down a dangerous garden path when it comes to tape encryption standards

Sun Releases Virtualization Management Tool Under GPLv3

Company adopts open source strategy with its new xVM Ops Center solution

Case Study: A Healthy Sense of Security

While reacting to changes in the market, a health care services company has proactively tightened down security beyond HIPAA and aims for certification on the relatively tough ISO 27001 standard.

New Technique from Sentrigo Combats Zero-Day SQL Injection Database Attacks

Method detects attacks based on context, prevents privilege escalation attempts

In Post-Consolidation BI-scape, Pure Play Vendors See Opportunity

Oracle, SAP, and IBM will soon find themselves up to their respective ears in acquisition-related integration issues, BI pure play stalwarts argue