Software


Cracking the Code of Data Protection

Storage consolidation into a SAN is often a code word for re-centralization, a strategy based more on nostalgia than necessity—or benefit.

Monitoring VoIP Communication: Five Key Measures

Five key measures to monitor to address infrastructure problems.

Podcast: Wikis in the Workplace

How this popular consumer tool fits in the enterprise

IMS at a Crossroads?

Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now

Beware Active Microsoft Word Vulnerability, Rogue Browser

Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.

White Paper: CA's Legacy Renewal Solution

Learn how you can retain and extend the value of your mainframe applications

IT Spending: Following the Money

Business leaders are focusing on strategic technologies, including BI, Web-based apps, and vertical solutions



Google Courts Business Intelligence Players

Business Objects and IBI hop on Google’s OneBox Enterprise Bandwagon

Informatica’s Software-as-a-Service Gambit

Hail Mary or Hail Abbasi: Is Informatica’s come-to-SaaS moment a case of a vendor leading the market by its nose?

SAS Jumps Into the Performance Management Fray

SAS’ PM platform release gathers together—under one big proverbial tent—several PM products it has marketed for years.

Herding CA(T)S Caringo Launches Software-Only CAS Solution

The fur will fly as Centera flaws are exposed

Test Your Knowledge of Broadband Use

Match your knowledge with In-Stat’s latest broadband report.

Q&A: Achieving More Value from Enterprise Applications

From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.

Best Practices for Effective URL Filtering and Monitoring

Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.