A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
EIM strategy takes BO somewhat far afield from its bread-and-butter BI stomping grounds. Analysts say that might be a good thing.
For a product like WebFocus, support for that most coruscating of new Web app dev paradigms—AJaX—was a foregone conclusion.
Just because Microsoft is now a business intelligence player doesn’t mean it can’t "coopetate", so to speak, with the best of them.
We explore what factors are important when organizations choose their outsourcing partners. Price isn’t the primary consideration.
What’s the best way to stop users from inadvertently compromising your company’s information security?
From Wikis to mash-ups, users are taking development into their own hands as never before.
Forget the tape versus multi-hop-mirroring battle. Our storage analyst, Jon Toigo, has some suggestions.
Successful service-enablement requires a high degree of visibility into an organization’s IT inner workings.
Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.