Software


Why Vista Was Vulnerable to Animated Cursors

Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.

Seven Best Practices for Managing Physical and IT Security Convergence

How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.

Threat-Investigation Product Intellinx Version 3 Released

The latest version features new capabilities to manage and organize investigations

Behind CA’s Storage Reshuffle

The move will likely have mixed impact on most CA customers, although mainframe shops should expect some benefits

QlikView 8 Updates In-Memory Business Intelligence

Targets actionable analytics, collaborative analytics, mass user deployment, and mass document deployment

Mirapoint's RazorGate Debuts With Embedded Policy Engine

The e-mail security product enforces policies without compromising network resources

Project Insight Release Includes Web Services, SDK

APIs enable communication between two software applications using a standard language



EventTracker Knowledge Base Hits Milestone

The event database has registered more than 30,000 users

TDWI Radio News: The Mid-Sized Market for BI and PM

As pricepoints drop and knowledge about business intelligence and performance management spreads, has the information management industry reached a tipping point? Find out what Microsoft, Business Objects, Hyperion, LogiXML and InSolve have to say.

Why BI and PM Projects Fail

It’s a no-brainer: few of them actually have the strong top-down support that they need to be successful, Gartner claims

Business Objects’ Late April Binge

Business Objects picked up a best-of-breed PM provider and launched new versions of its ETL and EII tools last week.

Complaisant or Compliant: Training Employees to Care

In compliance, a focus on technical security can eclipse human factors. Particularly in IT compliance, a focus on technical security tends to eclipse human factors, with serious compliance implications. Good training programs need to be measured, controlled, and incorporate feedback loops so that the people responsible for the rulemaking getinput from the enforcers and (more importantly) from the employees who are subject to them.

3Leaf Systems Releases Virtual I/O Server

V-8000 delivers mainframe-class capabilities for commodity servers

Seeing Your Application Through Your End Users’ Eyes

End- user experience management is becoming an important component for ensuring the success of Web-based applications.

Presentation Toolset in Testing Phase

New tools from IdentityMine facilitate development using Microsoft's recently announced multimedia browser plug-in platform

Built-in Archiving: Use at Your Own Risk -- Part III of a Series

Can non-native archive management software improve the performance of the e-mail server by automatically archiving messages without user intervention?

Why PowerTech Group Wants to Update Your AS/400 Security Model

If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention

IBM SOA Institute Targets U.S. Federal Organizations

Center will focus on SOA development, education

Outsourcers Must Plan Their Chindia Strategy

Industry analysts at Gartner say forward-thinking companies must develop what they call a “Chindia” strategy

Maxell DAT 160 Ups Data Cartridge Capacity to 160GB

Units begin shipping this month