Software


Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

You've Been Left a Legacy—Now What? (Part 1 of 2)

IT modernization projects help you deal with old application ghosts before they spook the bottom line. We examine project analysis and planning issues.

Microsoft's Virtualization Moves Still Lag

Two years on, Microsoft’s flagship offering still can’t hold a candle to VMWare. The question is when, if ever, will the software giant close the gap?



Microsoft Previews Next-Gen CRM Release

Microsoft says CRM 3.0 will help drive end user adoption and reduce TCO

Cautious Optimism on SQL Server 2005

Changes on tap in SQL Server 2005 worry some BI and DM pros

Unisys and Hyperion Partner for BI

Companies push a combined BI and financial-reporting solution based on the Unisys hardware and the Hyperion software

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

Building Your Knowledge Workshop

Knowledge workers perform craft work, and like any good craftsperson, you need a well-equipped workshop designed to meet the demands of your knowledge work.

When It Comes to ILM, Storage Vendors Want to Lock You In

When it comes to information lifecycle management, storage hardware vendors want to lock you in to their platform.

Q&A: Workarounds for Active Directory's Limitations

Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.

Improving Storage RAS - The Case for Migrating to RAID-6 Arrays

RAID-6 overcomes data-loss problems of RAID-5 arrays, but common hardware implementations are still needed to maintain performance.

Eclipse: One IDE to Rule Them All

Some enthusiasts tout Eclipse as an Rx for programming anarchy