Infrequent updates in security products themselves can be dangerous
There are seven ground rules for aligning business strategy with IT. Flub any one of them and you can kiss your alignment aspirations goodbye.
There are bright spots in our salary survey, particularly in the western U.S.
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
The mints get passed as the conversation turns to information lifecycle management.
The last fortnight has seen a flurry of activity in the once-sleepy text-mining space
Informatica’s courtship of two leading data-quality players helps to burnish its patina of openness
SPSS introduced a new version of its flagship data mining and statistical analysis product the company says is its most enterprise-ready tool to date
What organizations must do to transform BI from a departmental resource to an enterprise one.
Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.
Food to soothe the savage beast…..and maybe solve some problems.
IBM’s decision to eighty-six its DB2 OLAP Server has ramifications for mainframe and iSeries shops