Product portfolio details revealed at Synergy conference
With turnkey deployability and enterprise scalability, officials say Vertica-on-the-Cloud is a quick, painless, and inexpensive way to get into data warehousing
Firms that extend credit to consumers and small businesses must comply by November 1
An experienced practitioner and author recommends BSM best practices and suggests how you can avoid the most common mistakes.
New reportreveals that 42 percent of businesses surveyed don't know how many orphaned accounts they have, and over one-fourth don't have procedures to locate or turn off orphaned accounts
Lively panel discussion on the future of dynamic scripting languages held at JavaOne conference
Free online fixes problems for users with AMD-based systems
Deduplication tool features faster throughput and improved power efficiency
Latest version features more customizable reports and online tools
Ninety percent of the illicit Web sites using spam to generate traffic are clustered on only 2.5 percent of the registrars accredited by the Internet Corporation for Assigned Names and Numbers, making the spam problem seem almost manageable.
You can implement data warehouse solutions on a small budget by focusing on system, database, ETL, and reporting technologies that work in concert with requirements gathering, development, testing, and training. In the second part of our series, we look at how to keep human/personnel costs low.
Anti-virus maker PC Tools says Vista is more vulnerable to malware and other exploits
ETI touts is own unique spin on data integration: precompiled data integration executables. It's one of several key differentiators for the veteran competitor.
The Oracle In-Memory Database Cache keeps frequently accessed data in memory for faster performance. We look at the strengths, weaknesses, opportunities, and threats of this technology.
With BI powerhouses IBM, Oracle, and SAP nipping at its heels, SAS improves usability, readies new language converter
Microsoft rolls out prerelease versions of its solutions for small-to-medium businesses
Risks, rewards, and best practices
Social engineering ploy tricks computer users into divulging personal information that cybercriminals use to bilk unwary taxpayers.
Microsoft is investigating the matter, but the bug seems to derive from bad installs by OEMs on AMD-based computers