Software


IBM’s Fundamental Impasse: At Least Both Sides Are Still Talking

Fundamental Software has run smack up against Big Blue’s refusal to sanction 64-bit mainframe emulation

A Personal Data Warehouse?

Can you have a personal data warehouse? One man has built it, but you won’t find it in the store, at least not yet.

The Dashboard Reloaded: Tableau Touts Version 3.0 Release

Tableau 3.0 delivers a host of niceties, including support for rich formatting, free-form annotations, and—chiefly—a new Dynamic Dashboards component.

Cognos Makes Peace with Excel

C8 BI Analysis for Excel isn’t some gussied-up version of your business-analyst-power-user mentor’s Excel import and export capability, officials promise.

Caspio Releases Programming-Free Web Application Creator: Bridge 5.0

On-demand database platform helps users create Web applications without programming

Crossbeam Systems Enhances Operating System for C-Series

Offers intelligent fail-open and layer-2 bridging on enterprise UTM platforms

Moving Targets: The Risk of Mobile Devices

Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.



Emulation Licensing Problems Put FLEX-ES Shops in Limbo

Even as IBM and Fundamental continue to wrangle, FLEX-ES shops are dwelling in a kind of limbo. First in a series.

Securent Middleware Moves Authorization Out of Individual Apps

Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.

Analysis: Behind Software AG’s Acquisition of webMethods

The deal helps position Software AG as an ascendant SOA player in both North America and the EU

RecordTS Security Camera Software Tracks User Actions, File and Print Activity

RecordTS lets Citrix/ICA users record all user activity, including file transfers

Getting the NAC of Network Access Control

Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.

Bio-NetGuard WiFi Security Solution Shifts Verification using Biometrics

Biometric fingerprint solution eliminates passwords, secures WiFi LANs by verifying users, not equipment

Moonwalk Adds Disaster Recovery Features

Defends against primary data loss using metadata in file stubs

Talend Enhances Open-Source Data Integration App

Version 2.0 of the free application now includes Java language generation and expanded ELT support

MindBridge Launches Corporate Data-Monitoring Service

MindGuard released as software as a service; uses open-source software to locate sensitive data on workstations

As PM Evolves: Attack of the Big Spenders

Microsoft officials say PerformancePoint will help take performance management mainstream. So do many of the company’s competitors.

A Performance Management Primer: What Vendors Say

It seems every vendor has its own pet take on how BI and PM relate

A PM Primer: The Analyst View

Just how similar are BI and PM? How do they complement one another, and how do they differ? The issue might not be as complicated as it looks….

JavaScript Hijacking Vulnerability May Not Dampen AJAX Enthusiasm

A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.