Software


Storage Security, Part 7: Confusing Encryption with Security

Confusing encryption with data storage security can be dangerous to your storage protection strategy.

Podcast: Agile Development

Agile development’s benefits are considerable, but the approach may not be right for every project.

Varonis Improves Search, Scalability in Data Governance Software

Upgrade adds advanced search capabilities, enhances scalability, offers more built-in reports and auditing features

Salesforce.com Launches Summer '07 Release

Software-as-a-service provider updates customer relationship management solution

Corticon’s New Application Modernization Solution Unlocks Legacy Business Logic

Drives understanding of application, increased application agility

PrismTech To Offer Mission-Critical SOA Solution

Company's DDS-based solution adds quality-of-service and scalability to service-oriented architectures

TDWI Tech Market Report Distills BI Tools Landscape

Get the skinny on the business intelligence tools market.



Still Another Data Integration Independent Acquired

IBM positions the DataMirror acquisition as a coup for its ever-expanding information management portfolio. No surprise there!

TDWI Radio News: SOA, Cognos Style

We keep hearing about SOA, but what does it mean, really?

Shoring Up Your Framework

No single enterprise risk management framework is comprehensive enough to guide your company in meeting all of its compliance, governance, and risk management needs. Instead, you'll want to selectively combine standards by building around a central framework, such as COSO or AS/NZS 4360, and reinforcing it with one or more of these risk assessment standards.

No Catch to IBM Specialty Processors

IBM wouldn’t just give mainframe capacity away, would it? The short answer is: yes, it would—and it has.

Closing Security Holes with Application Scanners

Before unleashing sites and software, these products will spotlight code that can leave you vulnerable

Job Scheduling: The Three Generations

In the first of a three-part series, we outline the evolution of workload automation technology.

Industry Heavyweights Partner to Promote Secure Computing Infrastructure

Can the combined will of Microsoft, Cisco, and EMC overcome the ingrained inertia of government bureaucracy?

Storage Security Part VI: Locking Down the Disk

One company offers a way to secure data when different classes of data have different security requirements.

Windows Vista WAN Optimization: Panacea or Pretender?

A close-up look at improvements to file sharing in Windows Vista

Watchfire Releases AppScan 7.6, Introduces Application Security Service

OnDemand software service leverages AppScan 7.6, security experts to target Web vulnerabilities

Tripwire Enterprise 7 Ensures Continuous Data Center Compliance

Assesses configurations, detects changes for policy compliance of IT infrastructure

Baby Steps: Teradata Verges Closer to Independence

Teradata users have been cautiously optimistic all along, and as things come down to the wire, user optimism seems to be growing.