The latest version includes a "profit waterfall chart" feature that pinpoints profitability components
Latest release supports greater record lengths and maximizes saved CPU time
Non-traditional data sources provide value and opportunity for increased performance
China is fast rising up the rungs of the global outsourcing ladder.
Opalis' run-book automation solution will be available for Linux platforms early next year
Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest
IT can choose from a variety of techniques to reduce its mainframe software costs
Secure Sockets Layer encryption presents a tradeoff between keeping data private and allowing for network monitoring and the detection of intruders. The solution: transparent SSL proxies.
The Q1 Ultra line will use AuthenTec's AES1610 sensors to protect against data theft
Company aims to provide technical support, documentation and indemnification for corporate users of open source software
New throttling capability helps publishers achieve greater control over piracy and software licensing
Scaling complex BI deployments isn’t getting any easier, Cognos and Appfluent say.
The BI Top Five is essentially unchanged from last year. In fact, the top four BI players seem to have dug themselves in for the long haul.
Even the mighty Microsoft now plays in the MDM space.
Company enhanced its business process management solution for a service-oriented architecture
If you do your homework, Big-Iron cost cutters argue, you can realize substantial mainframe software savings.
Securing SOA and Web services poses challenges for IT administrators. We look at several best practices and suggest how organizations should manage the transition to SOA and Web Services from a security perspective.
While there is no magic formula to ensure a project’s success, our four recommendations can help you address the common project issues with a combination of people, processes, and tools.
Company's XML firewall product gets an added distribution boost via virtualization
The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.