Software


Files, Files Everywhere

To help IT manage its file deluge, vendors are trying to develop a platform that delivers respectable performance for file access vendors. They're really just building a bigger junk drawer.

Q&A: Business Transaction Monitoring and Proactive IT Management

One way to keep problems from compromising your enterprise is to have a good monitoring system in place. We discuss the drivers and benefits of business transaction management, how it fits in your environment, and how your colleagues are using it.

Commodity Iron on Top

Though mainframe sales may be down, commodity server sales are strong.

Microsoft To Discontinue Essential Business Server

No future versions of midmarket server.

TDWI Conference Presages BI, DW Industry Rebirth

The mood at this year’s TDWI Winter World Conference may indicate that 2010 will turn out to be a great year for BI and DW.

Q&A: BI Pros Face Tough, Evolving Issues

A new survey reveals that companies still struggle with DW issues and are not leveraging enterprise data warehouses.

MDM at a Crossroads

Most data- or information-integration vendors tend to have ulterior motives when it comes to MDM.



Sunbelt Software Upgrades VIPRE Enterprise, Adds Premium Edition

Version 4.0 delivers enhanced security, manageability features; extends performance benefits to larger enterprises, managed service providers.

Imperva’s ThreatRadar Add-on Mitigates Automated Cyber Attacks

Reputation-based service for Web application security

Security and Compliance for SaaS BI

What impact does BI have on compliance?

Art of Defence Extends Distributed Web Application Firewall to the Cloud

Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.

KEMP Technologies Releases Load Balancer Virtual Appliance

Application delivery controller delivers redundant load balancing without hardware-related provisioning, maintenance issues

Study Spotlights Privacy, Data Security Vulnerabilities at Financial Services Firms

Consumer data in vulnerable during development, testing.

Software AG Introduces NaturalONE: High-Productivity Development and Testing Integrated with SOA and BPM

Delivers application lifecycle capabilities to users of Natural or developers more familiar with Java or COBOL.

RSA Keynote: Cloud's Future Depends on Security

People must be able to trust the cloud, RSA president says.

Cisco Announces "Borderless" Security at RSA

Company positioning as reconceptualization of enterprise security that focuses on endpoints, the network's edge, policy enforcement, and the data center.

The Key to SOA Success: Application Performance Management

Given its widespread adoption, service-oriented architecture is clearly an integral component of cloud computing and software-as-a-service. However, without the management tools to address such issues as application performance, the rapid development and deployment of SOA-based services could fail.

Video: Managing Storage Junk Drawers (Interview)

Digital Reef CEO Steve Akers explains the challenges confronting companies as they try to bring order to their storage junk drawers.

Q&A: What You Can Learn by Monitoring Network Flows

We explain how to leverage data from switches and routers using flow monitoring.

E-mail Attachments: Misperceptions That Can Compromise Security

Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.