Sun need not spin off MySQL
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cameras have settings, including zoom, focus, timer, filter; so do data models
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    BI tools guru Cindi Howson's annual assessment of the BI finds that ratings of success, enterprisewide use dip but business impact still strong.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A private cloud solution allows customers to access giant data centers themselves almost immediately after the data has been collected, thus addressing a long-standing need in the retail sector.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Panasonic employees moving from MS Exchange Server to IBM's LotusLive
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As the data experts, business users should regularly specify who has access to what data.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    A new study from Aberdeen Research shows what works for getting the best performance from your Web applications.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IT organizations are highly exposed to security breaches through their information worker's mobile devices.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Mainframe and high-end server fortunes took a beating in 2009. An industry veteran says 2010 is shaping up to be an improvement.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Five facts to help you navigate through the new standard.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    We examine the benefits and uses of building a private cloud, and explain the implementation best practices.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From confusion to overly ambitious goals, we look at five causes of EA program failure and how you can overcome them.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Vulnerability can enable remote code execution attacks.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Debate how data will be stored, shared in the future.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Concerns about security and compatibility hinder greater adoption
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Single patch for the month
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Understanding these ten server trends can help CIOs succeed despite an unsteady economy.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Desktop virtualization brings the computing power from the local workstation back to the data center, changing the entire computing paradigm.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From security issues to integrating heterogeneous devices, mobile device management is fraught with challenges.