Software


Auto-Update for Outdated Defenses

Infrequent updates in security products themselves can be dangerous

Seven Habits of Highly Successful Business/IT Aligners

There are seven ground rules for aligning business strategy with IT. Flub any one of them and you can kiss your alignment aspirations goodbye.

2005 Salary Survey, Part 3: The West Rebounds

There are bright spots in our salary survey, particularly in the western U.S.

Case Study: Polysius Takes Layered Approach to Endpoint Security

The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.

Storage Pain: The Consumer View (Part 2 of 2)

The mints get passed as the conversation turns to information lifecycle management.



SAS Revamps Data- and Text-Mining Tools

The last fortnight has seen a flurry of activity in the once-sleepy text-mining space

Informatica Doubles Down on Data Quality

Informatica’s courtship of two leading data-quality players helps to burnish its patina of openness

SPSS 14.0 Targets the Enterprise

SPSS introduced a new version of its flagship data mining and statistical analysis product the company says is its most enterprise-ready tool to date

Research Excerpt: Turning Business Intelligence into an Enterprise Resource (Part 2 of 2)

What organizations must do to transform BI from a departmental resource to an enterprise one.

Zotob Continues to Hammer Windows 2000

Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.

Storage Pain: The Consumer View (Part 1 of 2)

Food to soothe the savage beast…..and maybe solve some problems.

The Mainframe Loses One: IBM Ends Development, Resale of OLAP Engine

IBM’s decision to eighty-six its DB2 OLAP Server has ramifications for mainframe and iSeries shops