Software


PSI: The Newest Plug-Compatible Mainframe on the Block

PSI officials pledge to indemnify customers against liability and expect a return to normalcy -- post-litigation -- with Big Blue.

The Fall and Rise of Network Access Control

There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?

Microsoft Moves to the Forefront of Security

Microsoft’s recent flurry of security acquisitions finally results in a product announcement: Microsoft Forefront Client Security.

Serena Mariner Now an Integrated PPM/ALM Solution

Latest version promises greater visibility to maximize project efficiency

Gear6 Announces New CACHEfx Appliance Line

The line of caching appliances promises faster response times



Buffalo Ships First 3TB NAS for Small, Mid-Size Enterprises

New TeraStation Pro II uses four SATA drives, supports multiple RAID levels

Dataupia Unveils Dataupia Satori Server 12000

Appliance transparently integrates with existing databases

CiRBA Lists Enhancements to DCI 4.2

New features include enhanced user interface, and enhanced mapping and reporting tools

Shadow Studio Gains IAM, DB2 Support

A new dynamic-to-static SQL facility gives a static SQL experience to DB2 users

Consolidation Continues: TIBCO Nabs Spotfire

Does TIBCO’s acquisition of visualization specialist Spotfire Inc. portend a coming round of consolidations in the data viz space?

Beyond Reporting: InetSoft Thinks Bigger

iSuite boasts canned connectivity into heterogeneous data sources, which lets it support right-time reporting and analysis requirements.

Latest Version of Ipedo XIP Features New Caching Features

The product now supports MySQL external caching, and features distributed cache views

Analysis: HP Unveils NeoView

What makes HP think it can succeed where so many other vendors haven’t? A unique mix of software, services, and fault-tolerant servers, for starters.

Five Rules for Development-time SOA Governance

In our rush to adopt new technologies, we sometimes forget old disciplines that supported rigorous software development. Here are five rules that can help IT reduce the risk of failed SOA initiatives.

Why Vista Was Vulnerable to Animated Cursors

Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.

QlikView 8 Updates In-Memory Business Intelligence

Targets actionable analytics, collaborative analytics, mass user deployment, and mass document deployment

Blunt Advice for IT Follows TJX Breach

Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.

Bolted-on Archive Solutions: Ingestion Indigestion—Part IV of a Series

As with everything else in IT, performance is a key consideration when selecting a backup solution. Finding a reliable measure, however, is problematic.