Software


You've Been Left a Legacy—Now What? (Part 2 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We offer seven best practices for controlling and managing a project

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.

Sticking It Out on MVS

In spite of IBM’s best efforts, a lot of customers continue to run mission-critical applications on older MVS mainframes

Is Too Much Anti-Spyware a Bad Thing?

An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing



Microsoft's Challenge: Overcoming Crystal’s Dominance

Many enterprises still show a strong bias for Crystal Reports

Survey Says: BPM Goes Mainstream

BPM has long had an obscure relationship to BI

Unleashing Marketing Success with Data Infrastructure Performance

Data infrastructure can hamstring your marketing success

Revamped Oracle Database Packs BI Enhancements

XQuery support, .NET support among BI-friendly features

The New Security ROI

It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.

Oops—They’re Doing It Again

First, SMI-S, then Continuous Data Protection, and now ILM: SNIA’s on another meaningless standards-making jag

Microsoft and Apple Patch Operating Systems

Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4

IT Training: IBM Program Cultivates Talent in College Classrooms

IBM hopes to double the number of participating institutions by the end of 2005