Storage consolidation into a SAN is often a code word for re-centralization, a strategy based more on nostalgia than necessity—or benefit.
Five key measures to monitor to address infrastructure problems.
How this popular consumer tool fits in the enterprise
Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now
Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.
Learn how you can retain and extend the value of your mainframe applications
Business leaders are focusing on strategic technologies, including BI, Web-based apps, and vertical solutions
Business Objects and IBI hop on Google’s OneBox Enterprise Bandwagon
Hail Mary or Hail Abbasi: Is Informatica’s come-to-SaaS moment a case of a vendor leading the market by its nose?
SAS’ PM platform release gathers together—under one big proverbial tent—several PM products it has marketed for years.
The fur will fly as Centera flaws are exposed
Match your knowledge with In-Stat’s latest broadband report.
From SOA-enabled versions of third-party applications to SOA toolkits, we examine how to gain more value from your enterprise applications.
Employee abuse of an organization’s Internet access -- from running outcall services to illicitly selling a company’s products on eBay -- illustrate URL filtering and monitoring issues. Enterprises cite inappropriate content, productivity concerns, and lost bandwidth as reasons to monitor their employees’ Web use.