Software


Cyberethics: What the Public and Private Sector Misses

In the first of a two-part series, we talk with Michigan CISO Dan Lohrmann about his experience with security, consolidation, and public- versus private-sector considerations.

Vista Buffer-Overflow Vulnerabilities Exposed

Hackers can take control of a Vista machine

IBM Preps z/VM Overhaul

z/VM 5.3 might still be five months away, but many VM programmers are already licking their lips in anticipation

The New Bounce in Sun’s Step

From its chip strategy to its datacenter-in-a-box initiative, Sun has been reinvigorated

Goodbye Sunopsis, Hello Coopetition: Oracle Unveils Oracle Data Integrator

Oracle this week announced its first rev of ODI, along with an updated version of the Oracle Secure Enterprise Search tool it announced a year ago.

Microsoft’s PerformancePoint Server Coming into Focus

With PerformancePoint, Microsoft has a plausible reason to crow.



BI Heavies Look to the Mid-Market

For SME firms with limited IT know-how, BI is an especially tough nut to crack. It’s a nut BI players of every stripe desperately want to crack, however.

New Online Threats for the New Year

What's on SPI Labs' list of top Web application security threats it expects this year?

SOA, Better Value Driving System i Renaissance

Some industry watchers think Big Blue’s midrange workhorse might have finally turned a corner

SOA Finally Living Up to its Hype, Survey Shows

Development efforts are growing, and they’re finishing on time, new research says

CA Unveils Host-Based Intrusion Prevention System

As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.

Seven Strategies for Compliance Change Management

Driven especially by SOX, companies are turning to change management to provide needed discipline for changes to IT infrastructure and systems. To ensure the integrity of systems storing regulated data, as well as the attendant IT policies and procedures, companies are increasingly adopting change management practices.

Business Process Discovery: The Key to Mainframe Modernization

Business process discovery avoids the risks of traditional business process re-engineering efforts and yields immediate end-user benefits

VMware Workstation 6 Beta Begins

Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.