Monarch 8 lets users extract information directly from PDF files for analysis, or export data from PDF files to spreadsheets or databases
Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
Phantom users and orphaned accounts are widespread in the distributed space, but things are even worse in the mainframe world
There’s a good chance many highly specialized capabilities will find their way into DB2, Information Integrator, and other IBM products
Use of a standard IT governance model, such as ITIL, gives organizations specific information on how to improve IT disciplines related to service support and delivery.
At Computer Associates, CTO Yogesh Gupta doesn't just talk about data management or regulatory compliance from an academic standpoint. He's living it
If your phone is so smart, why is it an enterprise security risk?
Free Stuff a Security Risk; New Firefox Flaws Surface
Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
Many customers will welcome a tight coupling between Ascential and IBM technologies
Company’s new offering incorporates ILM practices to bring ballooning data warehouse volumes under control
Panorama Software says it won’t become just another notch in Microsoft’s mergers-and-acquisitions bedpost
Big Blue must navigate a torturous path as it competes against, and partners with, Compuware, CA, BMC, and other vendors in the mainframe tools space
With hiring is on the upswing, IT professionals once again have clout with potential employers
Almost every organization is over-invested in its software assets or paying for software it isn’t using. The trick is finding the how and the where