Software


Proginet Unveils E-Mail Attachment Manager

CFI Attachment Manager solves attachment challenges: size, storage, security, auditability

Business Objects Releases Xcelsius Engage 2008

Helps leverage live data in interactive presentations

Imperva Prevents Fraud by Monitoring Database Changes

SecureSphere provides row-level data auditing and alerts without requiring changes to database or applications

Computer Lab International Releases Fast, Power-Efficient Thin Client

High-resolution, dual-video-ready client is energy efficient and powered by a VIA Eden C7 processor

TDWI Audio Report: Improving Operational Effectiveness

Symphony Metreo CEO Tal Ball discusses the challenges today’s companies face in improving the operational effectiveness. Business analysts face huge challenges in making sense of disaggregated bits of information from across the enterprise, but new tools and approaches can help.

Datacastle Enhances Comprehensive, Endpoint Data Protection Solution

Software-as-a-Service solution combines continuous data protection with data security and vulnerability mitigation

Cognos/SPSS Coupling Aims to Fast-Track Predictive Analytics

Partners say new integration between Cognos 8 and Clementine can help accelerate predictive analytic deployments



Sypherlink Tackles the Messiest of Data Integration Dilemmas

Sypherlink can help automate the identification and mapping of data -- and it has the patents to prove it.

IT Outsourcing Faces Paradigm Shift

Increasingly, organizations are turning to IT outsourcing to enhance business outcomes instead of simply to control or reduce costs.

Accelerating Agility through Workload Automation

By using event-driven rules, workload automation can trigger work based on nearly any event, helping IT optimize finite resources so critical workloads run reliably.

OpTier’s CoreFirst Extends Visibility into Transactions in Virtual Environments

Business transaction management solution provides business visibility into virtualized environments

Trustworthy Computing: Examining Trust

Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.

Podcast: The Impact of Mobile Devices on Enterprise IT

Mobile devices have moved beyond the domain of executives, but the rapid increase in use has been a drain on IT resources. Here’s how IT can fight back.

Packeteer Releases Small, Comprehensive WAN Optimization Appliance

PacketShaper 900 offers WAN optimization in small, energy-efficient package

Mainframe's Rebirth, z10 Buzz Highlight SHARE Conference

This winter's SHARE conference was a user confab to remember, attracting young and old IT pros alike.

SaaS on the Rise in Small-to-Medium Businesses

Study finds that one fifth of small businesses use SaaS, doubt the rates of three years ago

Coral8 Updates Complex Event Processor

Software can now use standard SQL language to query Coral8 data

EmpowerID Enforces Roles in SharePoint Server 2007

Identity, entitlement management suite built on a business process management platform

Computer Science Enrollment, Degrees Continue Decline

Report says turnaround may be on the horizon