Can Google Office—not to mention a Google/Microsoft grudge match—be far off?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Why are the majors suddenly hip to the promise of DW appliances?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How to protect your organization from the most prevalent insider threat: legitimate users with access to confidential information
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    After protecting an enterprise from common virus attacks, IT must now protect its online applications.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SAS last month kicked off an ambitious new effort to train and educate VARs, integrators, and other resellers about its BI software
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Labor Day marks the move-in for most students, and it also marks the beginning of labor-intensive work for IT departments across colleges and universities nationwide. Find out what one institution is doing to secure its network for the school year.
                    
		            
                
                    
                    
                    
                 
            
                
            
    
                
	                
                    
                                        
		            
                    Are you open to open-source?  It’s out there, but look twice.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    WebFOCUS Resource Analyzer, a tool that’s designed to help organizations accelerate the performance of their WebFOCUS-based BI infrastructures.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The certain undeniable logic of Crystal Reports for Eclipse.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It’s a milestone release, analysts concede, even if—in most other respects—it brings little new to the table in terms of either features or functionality. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    While salaries are rising, angst continues to rise
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    To maximize learning, operate at your boundary of ignorance 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Mainframe integration tool improves customer service, productivity, accuracy
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Are a pair of recent Intel-to-System z defections a harbinger of what’s to come?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The Wild West adage “Never trust nobody” should be a storage manager’s creed.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Many CIOs arrived late to Sarbanes-Oxley efforts
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    One search engine is developing a solution that helps users secure their data from phishing attacks.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Customers are still betting their businesses on IMS and other “legacy” datastores—and mainframe ISVs are more than happy to oblige.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The challenge is to simultaneously ensure both the integrity and the appropriateness of BI data for the users who consume it.