Fundamental Software has run smack up against Big Blue’s refusal to sanction 64-bit mainframe emulation
Can you have a personal data warehouse? One man has built it, but you won’t find it in the store, at least not yet.
Tableau 3.0 delivers a host of niceties, including support for rich formatting, free-form annotations, and—chiefly—a new Dynamic Dashboards component.
C8 BI Analysis for Excel isn’t some gussied-up version of your business-analyst-power-user mentor’s Excel import and export capability, officials promise.
On-demand database platform helps users create Web applications without programming
Offers intelligent fail-open and layer-2 bridging on enterprise UTM platforms
Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.
Even as IBM and Fundamental continue to wrangle, FLEX-ES shops are dwelling in a kind of limbo. First in a series.
Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.
The deal helps position Software AG as an ascendant SOA player in both North America and the EU
RecordTS lets Citrix/ICA users record all user activity, including file transfers
Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.
Biometric fingerprint solution eliminates passwords, secures WiFi LANs by verifying users, not equipment
Defends against primary data loss using metadata in file stubs
Version 2.0 of the free application now includes Java language generation and expanded ELT support
MindGuard released as software as a service; uses open-source software to locate sensitive data on workstations
Microsoft officials say PerformancePoint will help take performance management mainstream. So do many of the company’s competitors.
It seems every vendor has its own pet take on how BI and PM relate
Just how similar are BI and PM? How do they complement one another, and how do they differ? The issue might not be as complicated as it looks….
A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.