Software


Can Networks Defend Themselves?

Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.

Q&A: What Makes a Good Chief Information Security Officer?

To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.

Storage Products of the Year

Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.

Careers: Study Shows You're Working Harder than Ever

If you think you’ve got a lot more on your plate these days, you’re probably right



Firstlogic and Pitney Bowes: The Data Quality Dynamic Duo That Almost Was

What really happened—and where does Firstlogic go from here?

Actuate Updates Financial Performance Management (FPM)

With its better-than-spreadsheet-spreadsheet marketing strategy, Actuate could find an eager audience for its FPM tool.

The SQL Server 2005 Coattail Effect

Will BPM and ETL ride to mainstream success on the coattails of Microsoft’s SQL Server 2005 juggernaut?

Trouble Brewing Between SAP and Big Blue?

Does IBM’s new master data management pitch take SAP, Oracle, and other enterprise applications vendors out of the loop?

Take IT from Bottom-Line Expense to Strategic Investment

How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?

Storage Encryption: Let the Feeding Frenzy Begin

Extra weight isn't just for the holidays. Here's a diet plan that might interest you.