Software


Own Your Identity: 10 Best Practices for Role-Based Access

Learn the 10 best practices for access management collaboration.

Microsoft Releases Visual Studio 2008

.NET Framework 3.5 also released

OASIS Ramps Up SDO Efforts for SOAs

The standards group formed a technical committee to foster the Service Data Objects specification, an approach for handling data in service-oriented architectures

IBM Creates New Centers of Excellence

Help clients launch products safely and in less time

Entuity Updates Eye of the Storm

Network management suite improves service delivery and management of VMWare environments

Novell SecureLogin Adds Support for Windows Vista

Single sign-on solution updates features to enforce consistent password policy, address compliance mandates

Vaau Launches RBACx 4.0 AT

Software solution strengthens enterprise security, compliance, administration efficiency



Novell Updates Identity Manager with Roles-Based Provisioning

Integrated with Novell Identity Manager so users can tie identity to business processes

ParAccel Touts Columnar Analytic Database

ParAccel’s analytic database can be used on its own or dropped right into place alongside your existing SQL Server assets.

SWOT: IBM’s Pending Acquisition of Cognos

What does the IBM/Cognos agreement mean? Analyst Mike Schiff explores the news from four angles.

Sun's CEO Unveils Virtualization Solution

Schwartz describes virtualization management platform at Oracle OpenWorld event

Podcast: Best Practices for Application Integration

There are better ways than cut-and-paste to share data between applications.

AmeriVault’s RestartIT-VDR Enables Virtualized Disaster Recovery

Emulates customer servers in a virtual environment

New IBM Security Scanning Software Protects Businesses from Hackers

Identifies, validates, and reports on application security vulnerabilities

Big Blue Gives Mainframe Programming a Rational Retrofit

IBM’s new Rational offerings make it easier for customers to expose COBOL assets as Web services and automatically generate COBOL or Java code

IT Budgets May Suffer in 2008

Economic uncertainty got you down? You’re not alone. Gartner says you need to start thinking now about a potentially tumultuous 2008.

PowerTech Updates Interact -- Real-time Security for IBM System i

Gives enterprises visibility into intrusion, penetration attempts targeting System i (AS/400) hardware

At the Crossroads: Reengineering Storage from the Bottom Up

How much is storage compromised by simply adding more of the same?

Compliance and Security, Part 2: Uniting Efforts

In the second of three parts, unifying security, compliance, and risk assessment get better results

Symphoniq's TrueView Express Monitors User Experience

Low-cost, lightweight end-to-end user monitoring can be live in under an hour