Software


PreEmptive Solutions Ships DashO Version 5

Secures Java applications, monitors application use

Xangati’s New Visual Trouble Ticket Automates, Improves Help Desk Function with Environment Recordings

By extending the company’s Application Management 2.0 framework, program improves collaboration, data collection when troubleshooting problems, even in cloud-computing environments.

VMware to Announce Cloud Computing Vision Tuesday

VMware positioning vSphere as coud computing for the data center

Crossbeam Updates X-Series Security Platform

New blades, enhanced operating system improve scalability, performance, and cost savings

Tolly Tool Eases RFP Process for IT Equipment and Software Acquisition

Offer IT buyers proven, unbiased framework for assessing performance, features, and power consumption of IT products

April Patch Arrives with Critical Fixes

Addresses 23 vulnerabilities

Q&A: The True Meaning of SaaS and Shared Services

How the terms software-as-a-service and shared services are being used, what they really mean, and where the technologies are headed.



The Rising Tide in the Data Warehouse vs. Data Mart Debate

Although an enterprise scope is still seen as the Holy Grail of data warehousing, departmental and even enterprise data marts are now countenanced as well.

IT Pros Cautious About Moving to Windows 7

Most don't expect to deploy Windows 7 in the next year

MySQL Tuning Best Practices

Detailed tips and tricks for getting the most out of MySQL in the enterprise

Virtualization Benefits: Beyond Server Consolidation

Virtualization has provided economic benefits, but there are more benefits to be had.

Jon Toigo

A Five Billion Dollar Data Center Bailout Strategy

It's time to challenge your concept of how LAN and SAN connectivity should be instrumented, and save money in the process.

Q&A: IT and Business Transaction Management

How managing IT from a business-transaction perspective may guarantee service quality for end users.

Stephen Swoyer

Why Web Attacks Are Rising

A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.

Virtualization Best Practices: Tweaked Proverbs

Despite the novelty of virtualization (along with its unforeseen applications), tried-and-true axioms and sage wisdom of the past -- albeit with new twists -- can guide best practices while treading uncovered ground.

Stephen Swoyer

Intel Pitches Value, Not Performance, in Xeon Launch

By trumpeting new energy and power-management features, Intel and its partners hope to make a business case for Xeon 5550.

Q&A: Preventing Data Loss

A closer look at the components and best practices for success with your data loss prevention project.

Web Increasingly Dangerous as Threats Grow at Record Pace, Symantec Report Reveals

Web-based attacks more sophisticated, hackers' targets now end-user data, not systems; stable underground economy driving thefts

Cutting Data Center Power Costs with Predictive Models

To be sure your green efforts are cutting power costs, IT must use the right metrics.

SMBs Aware of Security Risks but Fail to Adequately Protect Data

SMBs understand security risks but most have not enacted basic safeguards