Software


2007 Tech Budgets to Decline; Stealth Malware on the Rise

A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.



EIM: The Method to Business Objects’ Acquisition Madness

EIM strategy takes BO somewhat far afield from its bread-and-butter BI stomping grounds. Analysts say that might be a good thing.

Future Focus of the Web: AJaX All The Way

For a product like WebFocus, support for that most coruscating of new Web app dev paradigms—AJaX—was a foregone conclusion.

Microsoft 'Coopetates' With Hyperion

Just because Microsoft is now a business intelligence player doesn’t mean it can’t "coopetate", so to speak, with the best of them.

Outsourcing Survey 2006, Part 3: Success Factors in Selecting a Provider

We explore what factors are important when organizations choose their outsourcing partners. Price isn’t the primary consideration.

Employees Cause Most Security Breaches, Yet Response Lags

What’s the best way to stop users from inadvertently compromising your company’s information security?

Podcast: Situational Application Development

From Wikis to mash-ups, users are taking development into their own hands as never before.

A Season of Disasters: The Signs Are There

Forget the tape versus multi-hop-mirroring battle. Our storage analyst, Jon Toigo, has some suggestions.

SOA: The Services Are Out There

Successful service-enablement requires a high degree of visibility into an organization’s IT inner workings.

Q&A: Stopping Blended Threats with Multi-Function Security Appliances

Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.